All the vulnerabilites related to Huawei - Honor Magic2
cve-2019-5303
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | ALP-AL00B |
Version: Versions earlier than 9.1.0.333(C00E333R2P1T8) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T19:54:53.218Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "ALP-AL00B", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.333(C00E333R2P1T8)", }, ], }, { product: "ALP-L09", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.300(C432E4R1P9T8)", }, ], }, { product: "ALP-L29", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.315(C636E5R1P13T8)", }, ], }, { product: "BLA-L29C", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.321(C636E4R1P14T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.330(C432E6R1P12T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.302(C635E4R1P13T8)", }, ], }, { product: "Berkeley-AL20", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.333(C00E333R2P1T8)", }, ], }, { product: "Berkeley-L09", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.350(C10E3R1P14T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.351(C432E5R1P13T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.350(C636E4R1P13T8)", }, ], }, { product: "Charlotte-L09C", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.311(C185E4R1P11T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.345(C432E8R1P11T8)", }, ], }, { product: "Charlotte-L29C", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.325(C185E4R1P11T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.335(C636E3R1P13T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.345(C432E8R1P11T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.336(C605E3R1P12T8)", }, ], }, { product: "Columbia-AL10B", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, { product: "Columbia-L29D", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.350(C461E3R1P11T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.350(C185E3R1P12T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.350(C10E5R1P14T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.351(C432E5R1P13T8)", }, ], }, { product: "Cornell-AL00A", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, { product: "Cornell-L29A", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.328(C185E1R1P9T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.328(C432E1R1P9T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.330(C461E1R1P9T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.328(C636E2R1P12T8)", }, ], }, { product: "Emily-L09C", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.336(C605E4R1P12T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.311(C185E2R1P12T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.345(C432E10R1P12T8)", }, ], }, { product: "Emily-L29C", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.311(C605E2R1P12T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.311(C636E7R1P13T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.311(C432E7R1P11T8)", }, ], }, { product: "Ever-L29B", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.311(C185E3R3P1)", }, ], }, { product: "HUAWEI Mate 20", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.131(C00E131R3P1)", }, ], }, { product: "HUAWEI Mate 20 Pro", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.310(C185E10R2P1)", }, ], }, { product: "HUAWEI Mate 20 RS", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.135(C786E133R3P1)", }, ], }, { product: "HUAWEI Mate 20 X", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.135(C00E133R2P1)", }, ], }, { product: "HUAWEI P20", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, { product: "HUAWEI P20 Pro", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, { product: "HUAWEI P30", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.193", }, ], }, { product: "HUAWEI P30 Pro", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.186(C00E180R2P1)", }, ], }, { product: "HUAWEI Y9 2019", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.220(C605E3R1P1T8)", }, ], }, { product: "HUAWEI nova lite 3", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.305(C635E8R2P2)", }, ], }, { product: "Honor 10 Lite", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.283(C605E8R2P2)", }, ], }, { product: "Honor 8X", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.221(C461E2R1P1T8)", }, ], }, { product: "Honor View 20", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.238(C432E1R3P1)", }, ], }, { product: "Jackman-L22", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.247(C636E2R4P1T8)", }, ], }, { product: "Paris-L21B", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.331(C432E1R1P2T8)", }, ], }, { product: "Paris-L21MEB", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.331(C185E4R1P3T8)", }, ], }, { product: "Paris-L29B", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.331(C636E1R1P3T8)", }, ], }, { product: "Sydney-AL00", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.212(C00E62R1P7T8)", }, ], }, { product: "Sydney-L21", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.215(C432E1R1P1T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.213(C185E1R1P1T8)", }, ], }, { product: "Sydney-L21BR", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.213(C185E1R1P2T8)", }, ], }, { product: "Sydney-L22", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.258(C636E1R1P1T8)", }, ], }, { product: "Sydney-L22BR", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.258(C636E1R1P1T8)", }, ], }, { product: "SydneyM-AL00", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.228(C00E78R1P7T8)", }, ], }, { product: "SydneyM-L01", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.215(C782E2R1P1T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.213(C185E1R1P1T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.270(C432E3R1P1T8)", }, ], }, { product: "SydneyM-L03", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.217(C605E1R1P1T8)", }, ], }, { product: "SydneyM-L21", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.221(C461E1R1P1T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.215(C432E4R1P1T8)", }, ], }, { product: "SydneyM-L22", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.259(C185E1R1P2T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.220(C635E1R1P2T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.216(C569E1R1P1T8)", }, ], }, { product: "SydneyM-L23", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.226(C605E2R1P1T8)", }, ], }, { product: "Yale-L21A", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.154(C432E2R3P2)", }, { status: "affected", version: "Versions earlier than 9.1.0.154(C461E2R2P1)", }, { status: "affected", version: "Versions earlier than 9.1.0.154(C636E2R2P1)", }, ], }, { product: "Honor 20", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.152(C00E150R5P1)", }, ], }, { product: "Honor Magic2", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 10.0.0.187", }, ], }, { product: "Honor V20", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.234(C00E234R4P3)", }, ], }, ], descriptions: [ { lang: "en", value: "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-04-27T20:01:02", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-5303", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "ALP-AL00B", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.333(C00E333R2P1T8)", }, ], }, }, { product_name: "ALP-L09", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.300(C432E4R1P9T8)", }, ], }, }, { product_name: "ALP-L29", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.315(C636E5R1P13T8)", }, ], }, }, { product_name: "BLA-L29C", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.321(C636E4R1P14T8)", }, { version_value: "Versions earlier than 9.1.0.330(C432E6R1P12T8)", }, { version_value: "Versions earlier than 9.1.0.302(C635E4R1P13T8)", }, ], }, }, { product_name: "Berkeley-AL20", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.333(C00E333R2P1T8)", }, ], }, }, { product_name: "Berkeley-L09", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.350(C10E3R1P14T8)", }, { version_value: "Versions earlier than 9.1.0.351(C432E5R1P13T8)", }, { version_value: "Versions earlier than 9.1.0.350(C636E4R1P13T8)", }, ], }, }, { product_name: "Charlotte-L09C", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.311(C185E4R1P11T8)", }, { version_value: "Versions earlier than 9.1.0.345(C432E8R1P11T8)", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "Charlotte-L29C", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.325(C185E4R1P11T8)", }, { version_value: "Versions earlier than 9.1.0.335(C636E3R1P13T8)", }, { version_value: "Versions earlier than 9.1.0.345(C432E8R1P11T8)", }, { version_value: "Versions earlier than 9.1.0.336(C605E3R1P12T8)", }, ], }, }, { product_name: "Columbia-AL10B", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, }, { product_name: "Columbia-L29D", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.350(C461E3R1P11T8)", }, { version_value: "Versions earlier than 9.1.0.350(C185E3R1P12T8)", }, { version_value: "Versions earlier than 9.1.0.350(C10E5R1P14T8)", }, { version_value: "Versions earlier than 9.1.0.351(C432E5R1P13T8)", }, ], }, }, { product_name: "Cornell-AL00A", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, }, { product_name: "Cornell-L29A", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.328(C185E1R1P9T8)", }, { version_value: "Versions earlier than 9.1.0.328(C432E1R1P9T8)", }, { version_value: "Versions earlier than 9.1.0.330(C461E1R1P9T8)", }, { version_value: "Versions earlier than 9.1.0.328(C636E2R1P12T8)", }, ], }, }, { product_name: "Emily-L09C", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.336(C605E4R1P12T8)", }, { version_value: "Versions earlier than 9.1.0.311(C185E2R1P12T8)", }, { version_value: "Versions earlier than 9.1.0.345(C432E10R1P12T8)", }, ], }, }, { product_name: "Emily-L29C", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.311(C605E2R1P12T8)", }, { version_value: "Versions earlier than 9.1.0.311(C636E7R1P13T8)", }, { version_value: "Versions earlier than 9.1.0.311(C432E7R1P11T8)", }, ], }, }, { product_name: "Ever-L29B", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.311(C185E3R3P1)", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "HUAWEI Mate 20", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.131(C00E131R3P1)", }, ], }, }, { product_name: "HUAWEI Mate 20 Pro", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.310(C185E10R2P1)", }, ], }, }, { product_name: "HUAWEI Mate 20 RS", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.135(C786E133R3P1)", }, ], }, }, { product_name: "HUAWEI Mate 20 X", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.135(C00E133R2P1)", }, ], }, }, { product_name: "HUAWEI P20", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, }, { product_name: "HUAWEI P20 Pro", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, }, { product_name: "HUAWEI P30", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.193", }, ], }, }, { product_name: "HUAWEI P30 Pro", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.186(C00E180R2P1)", }, ], }, }, { product_name: "HUAWEI Y9 2019", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.220(C605E3R1P1T8)", }, ], }, }, { product_name: "HUAWEI nova lite 3", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.305(C635E8R2P2)", }, ], }, }, { product_name: "Honor 10 Lite", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.283(C605E8R2P2)", }, ], }, }, { product_name: "Honor 8X", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.221(C461E2R1P1T8)", }, ], }, }, { product_name: "Honor View 20", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.238(C432E1R3P1)", }, ], }, }, { product_name: "Jackman-L22", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.247(C636E2R4P1T8)", }, ], }, }, { product_name: "Paris-L21B", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.331(C432E1R1P2T8)", }, ], }, }, { product_name: "Paris-L21MEB", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.331(C185E4R1P3T8)", }, ], }, }, { product_name: "Paris-L29B", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.331(C636E1R1P3T8)", }, ], }, }, { product_name: "Sydney-AL00", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.212(C00E62R1P7T8)", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "Sydney-L21", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.215(C432E1R1P1T8)", }, { version_value: "Versions earlier than 9.1.0.213(C185E1R1P1T8)", }, ], }, }, { product_name: "Sydney-L21BR", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.213(C185E1R1P2T8)", }, ], }, }, { product_name: "Sydney-L22", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.258(C636E1R1P1T8)", }, ], }, }, { product_name: "Sydney-L22BR", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.258(C636E1R1P1T8)", }, ], }, }, { product_name: "SydneyM-AL00", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.228(C00E78R1P7T8)", }, ], }, }, { product_name: "SydneyM-L01", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.215(C782E2R1P1T8)", }, { version_value: "Versions earlier than 9.1.0.213(C185E1R1P1T8)", }, { version_value: "Versions earlier than 9.1.0.270(C432E3R1P1T8)", }, ], }, }, { product_name: "SydneyM-L03", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.217(C605E1R1P1T8)", }, ], }, }, { product_name: "SydneyM-L21", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.221(C461E1R1P1T8)", }, { version_value: "Versions earlier than 9.1.0.215(C432E4R1P1T8)", }, ], }, }, { product_name: "SydneyM-L22", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.259(C185E1R1P2T8)", }, { version_value: "Versions earlier than 9.1.0.220(C635E1R1P2T8)", }, { version_value: "Versions earlier than 9.1.0.216(C569E1R1P1T8)", }, ], }, }, { product_name: "SydneyM-L23", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.226(C605E2R1P1T8)", }, ], }, }, { product_name: "Yale-L21A", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.154(C432E2R3P2)", }, { version_value: "Versions earlier than 9.1.0.154(C461E2R2P1)", }, { version_value: "Versions earlier than 9.1.0.154(C636E2R2P1)", }, ], }, }, { product_name: "Honor 20", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.152(C00E150R5P1)", }, ], }, }, { product_name: "Honor Magic2", version: { version_data: [ { version_value: "Versions earlier than 10.0.0.187", }, ], }, }, { product_name: "Honor V20", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.234(C00E234R4P3)", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-5303", datePublished: "2020-04-27T20:01:02", dateReserved: "2019-01-04T00:00:00", dateUpdated: "2024-08-04T19:54:53.218Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-1882
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-phone-en | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | Ever-L29B |
Version: earlier than 10.0.0.180(C185E6R3P3) Version: earlier than 10.0.0.180(C432E6R1P7) Version: earlier than 10.0.0.180(C636E5R2P3) |
||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:53:59.894Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-phone-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Ever-L29B", vendor: "Huawei", versions: [ { status: "affected", version: "earlier than 10.0.0.180(C185E6R3P3)", }, { status: "affected", version: "earlier than 10.0.0.180(C432E6R1P7)", }, { status: "affected", version: "earlier than 10.0.0.180(C636E5R2P3)", }, ], }, { product: "HUAWEI Mate 20 RS", vendor: "Huawei", versions: [ { status: "affected", version: "earlier than 10.0.0.175(C786E70R3P8)", }, ], }, { product: "HUAWEI Mate 20 X", vendor: "Huawei", versions: [ { status: "affected", version: "earlier than 10.0.0.176(C00E70R2P8)", }, ], }, { product: "Honor Magic2", vendor: "Huawei", versions: [ { status: "affected", version: "earlier than 10.0.0.175(C00E59R2P11)", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei mobile phones Ever-L29B versions earlier than 10.0.0.180(C185E6R3P3), earlier than 10.0.0.180(C432E6R1P7), earlier than 10.0.0.180(C636E5R2P3); HUAWEI Mate 20 RS versions earlier than 10.0.0.175(C786E70R3P8); HUAWEI Mate 20 X versions earlier than 10.0.0.176(C00E70R2P8); and Honor Magic2 versions earlier than 10.0.0.175(C00E59R2P11) have an improper authorization vulnerability. Due to improper authorization of some function, attackers can bypass the authorization to perform some operations.", }, ], problemTypes: [ { descriptions: [ { description: "Improper Authorization", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-02-17T23:43:27", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-phone-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1882", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Ever-L29B", version: { version_data: [ { version_value: "earlier than 10.0.0.180(C185E6R3P3)", }, { version_value: "earlier than 10.0.0.180(C432E6R1P7)", }, { version_value: "earlier than 10.0.0.180(C636E5R2P3)", }, ], }, }, { product_name: "HUAWEI Mate 20 RS", version: { version_data: [ { version_value: "earlier than 10.0.0.175(C786E70R3P8)", }, ], }, }, { product_name: "HUAWEI Mate 20 X", version: { version_data: [ { version_value: "earlier than 10.0.0.176(C00E70R2P8)", }, ], }, }, { product_name: "Honor Magic2", version: { version_data: [ { version_value: "earlier than 10.0.0.175(C00E59R2P11)", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei mobile phones Ever-L29B versions earlier than 10.0.0.180(C185E6R3P3), earlier than 10.0.0.180(C432E6R1P7), earlier than 10.0.0.180(C636E5R2P3); HUAWEI Mate 20 RS versions earlier than 10.0.0.175(C786E70R3P8); HUAWEI Mate 20 X versions earlier than 10.0.0.176(C00E70R2P8); and Honor Magic2 versions earlier than 10.0.0.175(C00E59R2P11) have an improper authorization vulnerability. Due to improper authorization of some function, attackers can bypass the authorization to perform some operations.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Improper Authorization", }, ], }, ], }, references: { reference_data: [ { name: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-phone-en", refsource: "CONFIRM", url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-phone-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1882", datePublished: "2020-02-17T23:43:27", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:53:59.894Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2020-1826
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-phone-en | x_refsource_CONFIRM |
Vendor | Product | Version | |
---|---|---|---|
▼ | Huawei | Honor Magic2 |
Version: Versions earlier than 10.0.0.175(C00E59R2P11) |
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T06:46:30.919Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-phone-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Honor Magic2", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 10.0.0.175(C00E59R2P11)", }, ], }, ], descriptions: [ { lang: "en", value: "Huawei Honor Magic2 mobile phones with versions earlier than 10.0.0.175(C00E59R2P11) have an information leak vulnerability. Due to a module using weak encryption tool, an attacker with the root permission may exploit the vulnerability to obtain some information.", }, ], problemTypes: [ { descriptions: [ { description: "Information Leak", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-01-09T16:40:03", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-phone-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2020-1826", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Honor Magic2", version: { version_data: [ { version_value: "Versions earlier than 10.0.0.175(C00E59R2P11)", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Huawei Honor Magic2 mobile phones with versions earlier than 10.0.0.175(C00E59R2P11) have an information leak vulnerability. Due to a module using weak encryption tool, an attacker with the root permission may exploit the vulnerability to obtain some information.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Information Leak", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-phone-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-phone-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2020-1826", datePublished: "2020-01-09T16:40:03", dateReserved: "2019-11-29T00:00:00", dateUpdated: "2024-08-04T06:46:30.919Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2019-5302
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en | x_refsource_CONFIRM |
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Huawei | Sydney-L21 |
Version: Versions earlier than 9.1.0.215(C432E1R1P1T8) Version: Versions earlier than 9.1.0.213(C185E1R1P1T8) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T19:54:52.990Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Sydney-L21", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.215(C432E1R1P1T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.213(C185E1R1P1T8)", }, ], }, { product: "Sydney-L21BR", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.213(C185E1R1P2T8)", }, ], }, { product: "Sydney-L22", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.258(C636E1R1P1T8)", }, ], }, { product: "Sydney-L22BR", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.258(C636E1R1P1T8)", }, ], }, { product: "SydneyM-AL00", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.228(C00E78R1P7T8)", }, ], }, { product: "SydneyM-L01", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.215(C782E2R1P1T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.213(C185E1R1P1T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.270(C432E3R1P1T8)", }, ], }, { product: "SydneyM-L03", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.217(C605E1R1P1T8)", }, ], }, { product: "SydneyM-L21", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.221(C461E1R1P1T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.215(C432E4R1P1T8)", }, ], }, { product: "SydneyM-L22", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.259(C185E1R1P2T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.220(C635E1R1P2T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.216(C569E1R1P1T8)", }, ], }, { product: "SydneyM-L23", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.226(C605E2R1P1T8)", }, ], }, { product: "Yale-L21A", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.154(C432E2R3P2)", }, { status: "affected", version: "Versions earlier than 9.1.0.154(C461E2R2P1)", }, { status: "affected", version: "Versions earlier than 9.1.0.154(C636E2R2P1)", }, ], }, { product: "Honor 20", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.152(C00E150R5P1)", }, ], }, { product: "Honor Magic2", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 10.0.0.187", }, ], }, { product: "Honor V20", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.234(C00E234R4P3)", }, ], }, { product: "HUAWEI Mate 20", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.131(C00E131R3P1)", }, ], }, { product: "HUAWEI Mate 20 Pro", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.310(C185E10R2P1)", }, ], }, { product: "HUAWEI Mate 20 RS", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.135(C786E133R3P1)", }, ], }, { product: "HUAWEI Mate 20 X", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.135(C00E133R2P1)", }, ], }, { product: "HUAWEI P20", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, { product: "HUAWEI P20 Pro", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, { product: "HUAWEI P30", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.193", }, ], }, { product: "HUAWEI P30 Pro", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.186(C00E180R2P1)", }, ], }, { product: "HUAWEI Y9 2019", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.220(C605E3R1P1T8)", }, ], }, { product: "HUAWEI nova lite 3", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.305(C635E8R2P2)", }, ], }, { product: "Honor 10 Lite", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.283(C605E8R2P2)", }, ], }, { product: "Honor 8X", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.221(C461E2R1P1T8)", }, ], }, { product: "Honor View 20", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.238(C432E1R3P1)", }, ], }, { product: "Jackman-L22", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.247(C636E2R4P1T8)", }, ], }, { product: "Paris-L21B", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.331(C432E1R1P2T8)", }, ], }, { product: "Paris-L21MEB", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.331(C185E4R1P3T8)", }, ], }, { product: "Paris-L29B", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.331(C636E1R1P3T8)", }, ], }, { product: "Sydney-AL00", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.212(C00E62R1P7T8)", }, ], }, { product: "Charlotte-L29C", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.325(C185E4R1P11T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.335(C636E3R1P13T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.345(C432E8R1P11T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.336(C605E3R1P12T8)", }, ], }, { product: "Columbia-AL10B", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, { product: "Columbia-L29D", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.350(C461E3R1P11T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.350(C185E3R1P12T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.350(C10E5R1P14T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.351(C432E5R1P13T8)", }, ], }, { product: "Cornell-AL00A", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, { product: "Cornell-L29A", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.328(C185E1R1P9T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.328(C432E1R1P9T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.330(C461E1R1P9T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.328(C636E2R1P12T8)", }, ], }, { product: "Emily-L09C", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.336(C605E4R1P12T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.311(C185E2R1P12T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.345(C432E10R1P12T8)", }, ], }, { product: "Emily-L29C", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.311(C605E2R1P12T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.311(C636E7R1P13T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.311(C432E7R1P11T8)", }, ], }, { product: "Ever-L29B", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.311(C185E3R3P1)", }, ], }, { product: "ALP-AL00B", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.333(C00E333R2P1T8)", }, ], }, { product: "ALP-L09", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.300(C432E4R1P9T8)", }, ], }, { product: "ALP-L29", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.315(C636E5R1P13T8)", }, ], }, { product: "BLA-L29C", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.321(C636E4R1P14T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.330(C432E6R1P12T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.302(C635E4R1P13T8)", }, ], }, { product: "Berkeley-AL20", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.333(C00E333R2P1T8)", }, ], }, { product: "Berkeley-L09", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.350(C10E3R1P14T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.351(C432E5R1P13T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.350(C636E4R1P13T8)", }, ], }, { product: "Charlotte-L09C", vendor: "Huawei", versions: [ { status: "affected", version: "Versions earlier than 9.1.0.311(C185E4R1P11T8)", }, { status: "affected", version: "Versions earlier than 9.1.0.345(C432E8R1P11T8)", }, ], }, ], descriptions: [ { lang: "en", value: "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)", }, ], problemTypes: [ { descriptions: [ { description: "Denial of Service", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2020-04-27T19:50:50", orgId: "25ac1063-e409-4190-8079-24548c77ea2e", shortName: "huawei", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@huawei.com", ID: "CVE-2019-5302", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Sydney-L21", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.215(C432E1R1P1T8)", }, { version_value: "Versions earlier than 9.1.0.213(C185E1R1P1T8)", }, ], }, }, { product_name: "Sydney-L21BR", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.213(C185E1R1P2T8)", }, ], }, }, { product_name: "Sydney-L22", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.258(C636E1R1P1T8)", }, ], }, }, { product_name: "Sydney-L22BR", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.258(C636E1R1P1T8)", }, ], }, }, { product_name: "SydneyM-AL00", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.228(C00E78R1P7T8)", }, ], }, }, { product_name: "SydneyM-L01", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.215(C782E2R1P1T8)", }, { version_value: "Versions earlier than 9.1.0.213(C185E1R1P1T8)", }, { version_value: "Versions earlier than 9.1.0.270(C432E3R1P1T8)", }, ], }, }, { product_name: "SydneyM-L03", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.217(C605E1R1P1T8)", }, ], }, }, { product_name: "SydneyM-L21", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.221(C461E1R1P1T8)", }, { version_value: "Versions earlier than 9.1.0.215(C432E4R1P1T8)", }, ], }, }, { product_name: "SydneyM-L22", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.259(C185E1R1P2T8)", }, { version_value: "Versions earlier than 9.1.0.220(C635E1R1P2T8)", }, { version_value: "Versions earlier than 9.1.0.216(C569E1R1P1T8)", }, ], }, }, { product_name: "SydneyM-L23", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.226(C605E2R1P1T8)", }, ], }, }, { product_name: "Yale-L21A", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.154(C432E2R3P2)", }, { version_value: "Versions earlier than 9.1.0.154(C461E2R2P1)", }, { version_value: "Versions earlier than 9.1.0.154(C636E2R2P1)", }, ], }, }, { product_name: "Honor 20", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.152(C00E150R5P1)", }, ], }, }, { product_name: "Honor Magic2", version: { version_data: [ { version_value: "Versions earlier than 10.0.0.187", }, ], }, }, { product_name: "Honor V20", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.234(C00E234R4P3)", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "HUAWEI Mate 20", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.131(C00E131R3P1)", }, ], }, }, { product_name: "HUAWEI Mate 20 Pro", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.310(C185E10R2P1)", }, ], }, }, { product_name: "HUAWEI Mate 20 RS", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.135(C786E133R3P1)", }, ], }, }, { product_name: "HUAWEI Mate 20 X", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.135(C00E133R2P1)", }, ], }, }, { product_name: "HUAWEI P20", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, }, { product_name: "HUAWEI P20 Pro", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, }, { product_name: "HUAWEI P30", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.193", }, ], }, }, { product_name: "HUAWEI P30 Pro", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.186(C00E180R2P1)", }, ], }, }, { product_name: "HUAWEI Y9 2019", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.220(C605E3R1P1T8)", }, ], }, }, { product_name: "HUAWEI nova lite 3", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.305(C635E8R2P2)", }, ], }, }, { product_name: "Honor 10 Lite", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.283(C605E8R2P2)", }, ], }, }, { product_name: "Honor 8X", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.221(C461E2R1P1T8)", }, ], }, }, { product_name: "Honor View 20", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.238(C432E1R3P1)", }, ], }, }, { product_name: "Jackman-L22", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.247(C636E2R4P1T8)", }, ], }, }, { product_name: "Paris-L21B", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.331(C432E1R1P2T8)", }, ], }, }, { product_name: "Paris-L21MEB", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.331(C185E4R1P3T8)", }, ], }, }, { product_name: "Paris-L29B", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.331(C636E1R1P3T8)", }, ], }, }, { product_name: "Sydney-AL00", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.212(C00E62R1P7T8)", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "Charlotte-L29C", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.325(C185E4R1P11T8)", }, { version_value: "Versions earlier than 9.1.0.335(C636E3R1P13T8)", }, { version_value: "Versions earlier than 9.1.0.345(C432E8R1P11T8)", }, { version_value: "Versions earlier than 9.1.0.336(C605E3R1P12T8)", }, ], }, }, { product_name: "Columbia-AL10B", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, }, { product_name: "Columbia-L29D", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.350(C461E3R1P11T8)", }, { version_value: "Versions earlier than 9.1.0.350(C185E3R1P12T8)", }, { version_value: "Versions earlier than 9.1.0.350(C10E5R1P14T8)", }, { version_value: "Versions earlier than 9.1.0.351(C432E5R1P13T8)", }, ], }, }, { product_name: "Cornell-AL00A", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.333(C00E333R1P1T8)", }, ], }, }, { product_name: "Cornell-L29A", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.328(C185E1R1P9T8)", }, { version_value: "Versions earlier than 9.1.0.328(C432E1R1P9T8)", }, { version_value: "Versions earlier than 9.1.0.330(C461E1R1P9T8)", }, { version_value: "Versions earlier than 9.1.0.328(C636E2R1P12T8)", }, ], }, }, { product_name: "Emily-L09C", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.336(C605E4R1P12T8)", }, { version_value: "Versions earlier than 9.1.0.311(C185E2R1P12T8)", }, { version_value: "Versions earlier than 9.1.0.345(C432E10R1P12T8)", }, ], }, }, { product_name: "Emily-L29C", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.311(C605E2R1P12T8)", }, { version_value: "Versions earlier than 9.1.0.311(C636E7R1P13T8)", }, { version_value: "Versions earlier than 9.1.0.311(C432E7R1P11T8)", }, ], }, }, { product_name: "Ever-L29B", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.311(C185E3R3P1)", }, ], }, }, ], }, vendor_name: "Huawei", }, { product: { product_data: [ { product_name: "ALP-AL00B", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.333(C00E333R2P1T8)", }, ], }, }, { product_name: "ALP-L09", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.300(C432E4R1P9T8)", }, ], }, }, { product_name: "ALP-L29", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.315(C636E5R1P13T8)", }, ], }, }, { product_name: "BLA-L29C", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.321(C636E4R1P14T8)", }, { version_value: "Versions earlier than 9.1.0.330(C432E6R1P12T8)", }, { version_value: "Versions earlier than 9.1.0.302(C635E4R1P13T8)", }, ], }, }, { product_name: "Berkeley-AL20", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.333(C00E333R2P1T8)", }, ], }, }, { product_name: "Berkeley-L09", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.350(C10E3R1P14T8)", }, { version_value: "Versions earlier than 9.1.0.351(C432E5R1P13T8)", }, { version_value: "Versions earlier than 9.1.0.350(C636E4R1P13T8)", }, ], }, }, { product_name: "Charlotte-L09C", version: { version_data: [ { version_value: "Versions earlier than 9.1.0.311(C185E4R1P11T8)", }, { version_value: "Versions earlier than 9.1.0.345(C432E8R1P11T8)", }, ], }, }, ], }, vendor_name: "Huawei", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3)", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Denial of Service", }, ], }, ], }, references: { reference_data: [ { name: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en", refsource: "CONFIRM", url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "25ac1063-e409-4190-8079-24548c77ea2e", assignerShortName: "huawei", cveId: "CVE-2019-5302", datePublished: "2020-04-27T19:50:50", dateReserved: "2019-01-04T00:00:00", dateUpdated: "2024-08-04T19:54:52.990Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
var-202001-1011
Vulnerability from variot
Huawei Honor Magic2 mobile phones with versions earlier than 10.0.0.175(C00E59R2P11) have an information leak vulnerability. Due to a module using weak encryption tool, an attacker with the root permission may exploit the vulnerability to obtain some information. Huawei Honor Magic 2 is a smartphone from China's Huawei. The vulnerability stems from the use of weaker encryption tools by the program
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202001-1011", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "honor magic2", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.175\\(c00e59r2p11\\)", }, { model: "honor magic 2", scope: "lt", trust: 0.8, vendor: "huawei", version: "10.0.0.175(c00e59r2p11)", }, { model: "honor magic <=10.0.0.175", scope: "eq", trust: 0.6, vendor: "huawei", version: "2", }, { model: "honor magic2", scope: "eq", trust: 0.6, vendor: "huawei", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-02176", }, { db: "JVNDB", id: "JVNDB-2020-001323", }, { db: "NVD", id: "CVE-2020-1826", }, { db: "CNNVD", id: "CNNVD-202001-267", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_magic2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.175\\(c00e59r2p11\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_magic2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2020-1826", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei", sources: [ { db: "CNNVD", id: "CNNVD-202001-267", }, ], trust: 0.6, }, cve: "CVE-2020-1826", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "NVD", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", exploitabilityScore: 3.9, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", trust: 1, userInteractionRequired: false, vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Local", authentication: "None", author: "NVD", availabilityImpact: "None", baseScore: 2.1, confidentialityImpact: "Partial", exploitabilityScore: null, id: "CVE-2020-1826", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Low", trust: 0.8, userInteractionRequired: null, vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, { accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "CNVD", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "PARTIAL", exploitabilityScore: 3.9, id: "CNVD-2020-02176", impactScore: 2.9, integrityImpact: "NONE", severity: "LOW", trust: 0.6, vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "NONE", baseScore: 4.4, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", exploitabilityScore: 0.8, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "HIGH", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "None", baseScore: 4.4, baseSeverity: "Medium", confidentialityImpact: "High", exploitabilityScore: null, id: "CVE-2020-1826", impactScore: null, integrityImpact: "None", privilegesRequired: "High", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2020-1826", trust: 1.8, value: "MEDIUM", }, { author: "CNVD", id: "CNVD-2020-02176", trust: 0.6, value: "LOW", }, { author: "CNNVD", id: "CNNVD-202001-267", trust: 0.6, value: "LOW", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2020-02176", }, { db: "JVNDB", id: "JVNDB-2020-001323", }, { db: "NVD", id: "CVE-2020-1826", }, { db: "CNNVD", id: "CNNVD-202001-267", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei Honor Magic2 mobile phones with versions earlier than 10.0.0.175(C00E59R2P11) have an information leak vulnerability. Due to a module using weak encryption tool, an attacker with the root permission may exploit the vulnerability to obtain some information. Huawei Honor Magic 2 is a smartphone from China's Huawei. The vulnerability stems from the use of weaker encryption tools by the program", sources: [ { db: "NVD", id: "CVE-2020-1826", }, { db: "JVNDB", id: "JVNDB-2020-001323", }, { db: "CNVD", id: "CNVD-2020-02176", }, ], trust: 2.16, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2020-1826", trust: 3, }, { db: "JVNDB", id: "JVNDB-2020-001323", trust: 0.8, }, { db: "CNVD", id: "CNVD-2020-02176", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202001-267", trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-02176", }, { db: "JVNDB", id: "JVNDB-2020-001323", }, { db: "NVD", id: "CVE-2020-1826", }, { db: "CNNVD", id: "CNNVD-202001-267", }, ], }, id: "VAR-202001-1011", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2020-02176", }, ], trust: 1.1637175499999999, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "IoT", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-02176", }, ], }, last_update_date: "2023-12-18T14:04:52.061000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20200108-01-smartphone", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-phone-en", }, { title: "Patch for Huawei Honor Magic 2 Information Disclosure Vulnerability (CNVD-2020-02176)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/197017", }, { title: "Huawei Honor Magic 2 Repair measures for information disclosure vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=108368", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-02176", }, { db: "JVNDB", id: "JVNDB-2020-001323", }, { db: "CNNVD", id: "CNNVD-202001-267", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-327", trust: 1, }, { problemtype: "CWE-200", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-001323", }, { db: "NVD", id: "CVE-2020-1826", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.2, url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200108-01-phone-cn", }, { trust: 1, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200108-01-phone-en", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-1826", }, { trust: 0.8, url: "https://nvd.nist.gov/vuln/detail/cve-2020-1826", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-02176", }, { db: "JVNDB", id: "JVNDB-2020-001323", }, { db: "NVD", id: "CVE-2020-1826", }, { db: "CNNVD", id: "CNNVD-202001-267", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2020-02176", }, { db: "JVNDB", id: "JVNDB-2020-001323", }, { db: "NVD", id: "CVE-2020-1826", }, { db: "CNNVD", id: "CNNVD-202001-267", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-01-14T00:00:00", db: "CNVD", id: "CNVD-2020-02176", }, { date: "2020-01-31T00:00:00", db: "JVNDB", id: "JVNDB-2020-001323", }, { date: "2020-01-09T17:15:12.447000", db: "NVD", id: "CVE-2020-1826", }, { date: "2020-01-08T00:00:00", db: "CNNVD", id: "CNNVD-202001-267", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-01-14T00:00:00", db: "CNVD", id: "CNVD-2020-02176", }, { date: "2020-01-31T00:00:00", db: "JVNDB", id: "JVNDB-2020-001323", }, { date: "2021-07-21T11:39:23.747000", db: "NVD", id: "CVE-2020-1826", }, { date: "2020-01-09T00:00:00", db: "CNNVD", id: "CNNVD-202001-267", }, ], }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei Honor Magic2 Mobile Phone Information Disclosure Vulnerability", sources: [ { db: "JVNDB", id: "JVNDB-2020-001323", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "information disclosure", sources: [ { db: "CNNVD", id: "CNNVD-202001-267", }, ], trust: 0.6, }, }
var-202002-0608
Vulnerability from variot
Huawei mobile phones Ever-L29B versions earlier than 10.0.0.180(C185E6R3P3), earlier than 10.0.0.180(C432E6R1P7), earlier than 10.0.0.180(C636E5R2P3); HUAWEI Mate 20 RS versions earlier than 10.0.0.175(C786E70R3P8); HUAWEI Mate 20 X versions earlier than 10.0.0.176(C00E70R2P8); and Honor Magic2 versions earlier than 10.0.0.175(C00E59R2P11) have an improper authorization vulnerability. Due to improper authorization of some function, attackers can bypass the authorization to perform some operations. plural Huawei Mobile phones contain vulnerabilities related to fraudulent authentication.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202002-0608", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "ever-l29b", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.180\\(c432e6r1p7\\)", }, { model: "mate 20 rs", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.175\\(c786e70r3p8\\)", }, { model: "honor magic2", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.175\\(c00e59r2p11\\)", }, { model: "mate 20 x", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.176\\(c00e70r2p8\\)", }, { model: "ever-l29b", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.180\\(c185e6r3p3\\)", }, { model: "ever-l29b", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.180\\(c636e5r2p3\\)", }, { model: "ever-l29b", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.0.180(c185e6r3p3)", }, { model: "ever-l29b", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.0.180(c432e6r1p7)", }, { model: "ever-l29b", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.0.180(c636e5r2p3)", }, { model: "honor magic2", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.0.175(c00e59r2p11)", }, { model: "mate 20 rs", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.0.175(c786e70r3p8)", }, { model: "mate 20 x", scope: "eq", trust: 0.8, vendor: "huawei", version: "10.0.0.176(c00e70r2p8)", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-002148", }, { db: "NVD", id: "CVE-2020-1882", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:mate_20_rs_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.175\\(c786e70r3p8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:mate_20_rs:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:mate_20_x_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.176\\(c00e70r2p8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_magic2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.175\\(c00e59r2p11\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_magic2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.180\\(c185e6r3p3\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.180\\(c432e6r1p7\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.180\\(c636e5r2p3\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2020-1882", }, ], }, cve: "CVE-2020-1882", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "LOW", accessVector: "LOCAL", authentication: "NONE", author: "NVD", availabilityImpact: "NONE", baseScore: 2.1, confidentialityImpact: "NONE", exploitabilityScore: 3.9, impactScore: 2.9, integrityImpact: "PARTIAL", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", trust: 1, userInteractionRequired: false, vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Low", accessVector: "Local", authentication: "None", author: "NVD", availabilityImpact: "None", baseScore: 2.1, confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2020-002148", impactScore: null, integrityImpact: "Partial", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Low", trust: 0.8, userInteractionRequired: null, vectorString: "AV:L/AC:L/Au:N/C:N/I:P/A:N", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "PHYSICAL", author: "NVD", availabilityImpact: "NONE", baseScore: 4.6, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 0.9, impactScore: 3.6, integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, { attackComplexity: "Low", attackVector: "Physical", author: "NVD", availabilityImpact: "None", baseScore: 4.6, baseSeverity: "Medium", confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2020-002148", impactScore: null, integrityImpact: "High", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2020-1882", trust: 1, value: "MEDIUM", }, { author: "NVD", id: "JVNDB-2020-002148", trust: 0.8, value: "Medium", }, { author: "CNNVD", id: "CNNVD-202001-1461", trust: 0.6, value: "MEDIUM", }, ], }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-002148", }, { db: "NVD", id: "CVE-2020-1882", }, { db: "CNNVD", id: "CNNVD-202001-1461", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Huawei mobile phones Ever-L29B versions earlier than 10.0.0.180(C185E6R3P3), earlier than 10.0.0.180(C432E6R1P7), earlier than 10.0.0.180(C636E5R2P3); HUAWEI Mate 20 RS versions earlier than 10.0.0.175(C786E70R3P8); HUAWEI Mate 20 X versions earlier than 10.0.0.176(C00E70R2P8); and Honor Magic2 versions earlier than 10.0.0.175(C00E59R2P11) have an improper authorization vulnerability. Due to improper authorization of some function, attackers can bypass the authorization to perform some operations. plural Huawei Mobile phones contain vulnerabilities related to fraudulent authentication.Information may be tampered with", sources: [ { db: "NVD", id: "CVE-2020-1882", }, { db: "JVNDB", id: "JVNDB-2020-002148", }, ], trust: 1.62, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2020-1882", trust: 2.4, }, { db: "JVNDB", id: "JVNDB-2020-002148", trust: 0.8, }, { db: "CNNVD", id: "CNNVD-202001-1461", trust: 0.6, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-002148", }, { db: "NVD", id: "CVE-2020-1882", }, { db: "CNNVD", id: "CNNVD-202001-1461", }, ], }, id: "VAR-202002-0608", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "VARIoT devices database", id: null, }, ], trust: 0.5649351, }, last_update_date: "2023-12-18T14:00:38.914000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20200122-01-phone", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-phone-en", }, { title: "Vulnerability fixes for multiple Huawei product licensing issues", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=110507", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-002148", }, { db: "CNNVD", id: "CNNVD-202001-1461", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "NVD-CWE-noinfo", trust: 1, }, { problemtype: "CWE-863", trust: 0.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-002148", }, { db: "NVD", id: "CVE-2020-1882", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.6, url: "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200122-01-phone-en", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-1882", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-1882", }, { trust: 0.6, url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200122-01-phone-cn", }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-002148", }, { db: "NVD", id: "CVE-2020-1882", }, { db: "CNNVD", id: "CNNVD-202001-1461", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "JVNDB", id: "JVNDB-2020-002148", }, { db: "NVD", id: "CVE-2020-1882", }, { db: "CNNVD", id: "CNNVD-202001-1461", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-03-04T00:00:00", db: "JVNDB", id: "JVNDB-2020-002148", }, { date: "2020-02-18T00:15:11.460000", db: "NVD", id: "CVE-2020-1882", }, { date: "2020-01-22T00:00:00", db: "CNNVD", id: "CNNVD-202001-1461", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-03-04T00:00:00", db: "JVNDB", id: "JVNDB-2020-002148", }, { date: "2021-07-21T11:39:23.747000", db: "NVD", id: "CVE-2020-1882", }, { date: "2021-01-05T00:00:00", db: "CNNVD", id: "CNNVD-202001-1461", }, ], }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Unauthorized authentication vulnerabilities in mobile phones", sources: [ { db: "JVNDB", id: "JVNDB-2020-002148", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "authorization issue", sources: [ { db: "CNNVD", id: "CNNVD-202001-1461", }, ], trust: 0.6, }, }
var-202005-0624
Vulnerability from variot
Honor 20;HONOR 20 PRO;Honor Magic2;HUAWEI Mate 20 X;HUAWEI P30;HUAWEI P30 Pro;Honor View 20 smartphones with versions earlier than 10.0.0.187(C00E60R4P11); versions earlier than 10.0.0.187(C00E60R4P11); versions earlier than 10.0.0.176(C00E60R2P11);9.1.0.135(C00E133R2P1); versions earlier than 10.1.0.123(C431E22R3P5), versions earlier than 10.1.0.126(C636E5R3P4), versions earlier than 10.1.0.160(C00E160R2P11); versions earlier than 10.1.0.126(C185E8R5P1), versions earlier than 10.1.0.126(C636E9R2P4), versions earlier than 10.1.0.160(C00E160R2P8); versions earlier than 10.0.0.179(C636E3R4P3), versions earlier than 10.0.0.180(C185E3R3P3), versions earlier than 10.0.0.180(C432E10R3P4), versions earlier than 10.0.0.181(C675E5R1P2) have an out of bound read vulnerability. The software reads data past the end of the intended buffer. The attacker tricks the user into installing a crafted application, successful exploit may cause information disclosure or service abnormal. plural Huawei Smartphones contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be put into a state. Huawei Honor Magic 2 and others are all smartphones of the Chinese company Huawei.
There are security holes in many Huawei products. Huawei Smartphones could allow a remote malicious user to obtain sensitive information, caused by an out-of-bound read vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202005-0624", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "honor view <=10.0.0.180", scope: "eq", trust: 1.2, vendor: "huawei", version: "20", }, { model: "honor 20", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.187\\(c00e60r4p11\\)", }, { model: "honor magic2", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.176\\(c00e60r2p11\\)", }, { model: "honor view 20", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.188\\(c00e62r2p11\\)", }, { model: "honor view 20", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.180\\(c185e3r3p3\\)", }, { model: "honor view 20", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.179\\(c636e3r4p3\\)", }, { model: "honor view 20", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.180\\(c432e10r3p4\\)", }, { model: "honor 20 pro", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.187\\(c00e60r4p11\\)", }, { model: "honor 20 pro", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "honor 20", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "honor magic2", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "honor view 20", scope: null, trust: 0.8, vendor: "huawei", version: null, }, { model: "honor view <=10.0.0.179", scope: "eq", trust: 0.6, vendor: "huawei", version: "20", }, { model: "honor view <=10.0.0.188", scope: "eq", trust: 0.6, vendor: "huawei", version: "20", }, { model: "honor 20s <=10.0.0.187", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "honor pro <=10.0.0.187", scope: "eq", trust: 0.6, vendor: "huawei", version: "20", }, { model: "honor magic2 <=10.0.0.176", scope: null, trust: 0.6, vendor: "huawei", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-28976", }, { db: "JVNDB", id: "JVNDB-2020-005501", }, { db: "NVD", id: "CVE-2020-1808", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.179\\(c636e3r4p3\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.180\\(c185e3r3p3\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.180\\(c432e10r3p4\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.188\\(c00e62r2p11\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.187\\(c00e60r4p11\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_20_pro_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.187\\(c00e60r4p11\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_20_pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_magic2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.176\\(c00e60r2p11\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_magic2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2020-1808", }, ], }, cve: "CVE-2020-1808", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, impactScore: 4.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "MEDIUM", trust: 1, userInteractionRequired: true, vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Medium", accessVector: "Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 5.8, confidentialityImpact: "Partial", exploitabilityScore: null, id: "JVNDB-2020-005501", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Medium", trust: 0.8, userInteractionRequired: null, vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:P", version: "2.0", }, { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, id: "CNVD-2020-28976", impactScore: 4.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", author: "VULMON", availabilityImpact: "PARTIAL", baseScore: 5.8, confidentialityImpact: "PARTIAL", exploitabilityScore: 8.6, id: "CVE-2020-1808", impactScore: 4.9, integrityImpact: "NONE", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "MEDIUM", trust: 0.1, userInteractionRequired: null, vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "LOW", attackVector: "LOCAL", author: "NVD", availabilityImpact: "HIGH", baseScore: 7.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", exploitabilityScore: 1.8, impactScore: 5.2, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.1", }, { attackComplexity: "Low", attackVector: "Local", author: "NVD", availabilityImpact: "High", baseScore: 7.1, baseSeverity: "High", confidentialityImpact: "High", exploitabilityScore: null, id: "JVNDB-2020-005501", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "Required", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2020-1808", trust: 1, value: "HIGH", }, { author: "NVD", id: "JVNDB-2020-005501", trust: 0.8, value: "High", }, { author: "CNVD", id: "CNVD-2020-28976", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-202005-773", trust: 0.6, value: "HIGH", }, { author: "VULMON", id: "CVE-2020-1808", trust: 0.1, value: "MEDIUM", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2020-28976", }, { db: "VULMON", id: "CVE-2020-1808", }, { db: "JVNDB", id: "JVNDB-2020-005501", }, { db: "NVD", id: "CVE-2020-1808", }, { db: "CNNVD", id: "CNNVD-202005-773", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "Honor 20;HONOR 20 PRO;Honor Magic2;HUAWEI Mate 20 X;HUAWEI P30;HUAWEI P30 Pro;Honor View 20 smartphones with versions earlier than 10.0.0.187(C00E60R4P11); versions earlier than 10.0.0.187(C00E60R4P11); versions earlier than 10.0.0.176(C00E60R2P11);9.1.0.135(C00E133R2P1); versions earlier than 10.1.0.123(C431E22R3P5), versions earlier than 10.1.0.126(C636E5R3P4), versions earlier than 10.1.0.160(C00E160R2P11); versions earlier than 10.1.0.126(C185E8R5P1), versions earlier than 10.1.0.126(C636E9R2P4), versions earlier than 10.1.0.160(C00E160R2P8); versions earlier than 10.0.0.179(C636E3R4P3), versions earlier than 10.0.0.180(C185E3R3P3), versions earlier than 10.0.0.180(C432E10R3P4), versions earlier than 10.0.0.181(C675E5R1P2) have an out of bound read vulnerability. The software reads data past the end of the intended buffer. The attacker tricks the user into installing a crafted application, successful exploit may cause information disclosure or service abnormal. plural Huawei Smartphones contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be put into a state. Huawei Honor Magic 2 and others are all smartphones of the Chinese company Huawei. \n\r\n\r\nThere are security holes in many Huawei products. Huawei Smartphones could allow a remote malicious user to obtain sensitive information, caused by an out-of-bound read vulnerability", sources: [ { db: "NVD", id: "CVE-2020-1808", }, { db: "JVNDB", id: "JVNDB-2020-005501", }, { db: "CNVD", id: "CNVD-2020-28976", }, { db: "VULMON", id: "CVE-2020-1808", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2020-1808", trust: 3.1, }, { db: "JVNDB", id: "JVNDB-2020-005501", trust: 0.8, }, { db: "CNVD", id: "CNVD-2020-28976", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-202005-773", trust: 0.6, }, { db: "VULMON", id: "CVE-2020-1808", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-28976", }, { db: "VULMON", id: "CVE-2020-1808", }, { db: "JVNDB", id: "JVNDB-2020-005501", }, { db: "NVD", id: "CVE-2020-1808", }, { db: "CNNVD", id: "CNNVD-202005-773", }, ], }, id: "VAR-202005-0624", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2020-28976", }, ], trust: 1.1906463624999999, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "IoT", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2020-28976", }, ], }, last_update_date: "2023-12-18T11:58:22.943000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20200513-02-smartphone", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-02-smartphone-en", }, { title: "Patch for Multiple Huawei product cross-border reading vulnerabilities (CNVD-2020-28976)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/217949", }, { title: "Multiple Huawei Product Buffer Error Vulnerability Fix", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=119100", }, { title: "Huawei Security Advisories: Security Advisory - Out of Bounds Read Vulnerability in Several Smartphones", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories&qid=ecabe2836d21a692fcba28d252a0cff2", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-28976", }, { db: "VULMON", id: "CVE-2020-1808", }, { db: "JVNDB", id: "JVNDB-2020-005501", }, { db: "CNNVD", id: "CNNVD-202005-773", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-125", trust: 1.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2020-005501", }, { db: "NVD", id: "CVE-2020-1808", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200513-02-smartphone-en", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2020-1808", }, { trust: 1.2, url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20200513-02-smartphone-cn", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-1808", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/125.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/181882", }, ], sources: [ { db: "CNVD", id: "CNVD-2020-28976", }, { db: "VULMON", id: "CVE-2020-1808", }, { db: "JVNDB", id: "JVNDB-2020-005501", }, { db: "NVD", id: "CVE-2020-1808", }, { db: "CNNVD", id: "CNNVD-202005-773", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2020-28976", }, { db: "VULMON", id: "CVE-2020-1808", }, { db: "JVNDB", id: "JVNDB-2020-005501", }, { db: "NVD", id: "CVE-2020-1808", }, { db: "CNNVD", id: "CNNVD-202005-773", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-05-19T00:00:00", db: "CNVD", id: "CNVD-2020-28976", }, { date: "2020-05-15T00:00:00", db: "VULMON", id: "CVE-2020-1808", }, { date: "2020-06-16T00:00:00", db: "JVNDB", id: "JVNDB-2020-005501", }, { date: "2020-05-15T14:15:11.810000", db: "NVD", id: "CVE-2020-1808", }, { date: "2020-05-13T00:00:00", db: "CNNVD", id: "CNNVD-202005-773", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2020-05-19T00:00:00", db: "CNVD", id: "CNVD-2020-28976", }, { date: "2020-07-27T00:00:00", db: "VULMON", id: "CVE-2020-1808", }, { date: "2020-06-16T00:00:00", db: "JVNDB", id: "JVNDB-2020-005501", }, { date: "2020-07-27T13:15:11.387000", db: "NVD", id: "CVE-2020-1808", }, { date: "2020-05-22T00:00:00", db: "CNNVD", id: "CNNVD-202005-773", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "local", sources: [ { db: "CNNVD", id: "CNNVD-202005-773", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Out-of-bounds read vulnerabilities on smartphones", sources: [ { db: "JVNDB", id: "JVNDB-2020-005501", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "buffer error", sources: [ { db: "CNNVD", id: "CNNVD-202005-773", }, ], trust: 0.6, }, }
var-202004-0618
Vulnerability from variot
There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3). plural Huawei There is a vulnerability related to input confirmation on smartphones.Service operation interruption (DoS) It may be put into a state. Huawei Honor10 Lite and Huawei Y9 are both smartphones from China's Huawei.
A denial of service vulnerability exists in Huawei Honor10 Lite Harry-AL00C versions earlier than 9.1.0.217 (C00E215R3P1) and before Huawei Y9 Jackman-L23 9.1.0.220 (C45E3R1P1T8). The vulnerability stems from the fact that the two fields are not duplicated when parsing
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-0618", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "sydneym-l03", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.217\\(c605e1r1p1t8\\)", }, { model: "berkeley-l09", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.350\\(c10e3r1p14t8\\)", }, { model: "sydney-l22", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.258\\(c636e1r1p1t8\\)", }, { model: "cornell-l29a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.328\\(c432e1r1p9t8\\)", }, { model: "y9 2019", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.220\\(c605e3r1p1t8\\)", }, { model: "emily-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.311\\(c605e2r1p12t8\\)", }, { model: "mate 20 pro", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.310\\(c185e10r2p1\\)", }, { model: "cornell-l29a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.330\\(c461e1r1p9t8\\)", }, { model: "alp-l29", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.315\\(c636e5r1p13t8\\)", }, { model: "mate 20", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.131\\(c00e131r3p1\\)", }, { model: "nova lite 3", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.305\\(c635e8r2p2\\)", }, { model: "sydney-l22br", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.258\\(c636e1r1p1t8\\)", }, { model: "sydneym-al00", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.228\\(c00e78r1p7t8\\)", }, { model: "sydneym-l22", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.259\\(c185e1r1p2t8\\)", }, { model: "sydneym-l01", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.213\\(c185e1r1p1t8\\)", }, { model: "yale-l21a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.154\\(c461e2r2p1\\)", }, { model: "cornell-l29a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.328\\(c185e1r1p9t8\\)", }, { model: "p20 pro", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.333\\(c00e333r1p1t8\\)", }, { model: "ever-l29b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.311\\(c185e3r3p1\\)", }, { model: "emily-l09c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.311\\(c185e2r1p12t8\\)", }, { model: "emily-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.311\\(c432e7r1p11t8\\)", }, { model: "alp-al00b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.333\\(c00e333r2p1t8\\)", }, { model: "mate 20 x", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.135\\(c00e133r2p1\\)", }, { model: "columbia-l29d", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.350\\(c10e5r1p14t8\\)", }, { model: "sydneym-l21", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.215\\(c432e4r1p1t8\\)", }, { model: "paris-l21b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.331\\(c432e1r1p2t8\\)", }, { model: "columbia-l29d", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.350\\(c461e3r1p11t8\\)", }, { model: "columbia-al10b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.333\\(c00e333r1p1t8\\)", }, { model: "paris-l29b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.331\\(c636e1r1p3t8\\)", }, { model: "p30 pro", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.186\\(c00e180r2p1\\)", }, { model: "berkeley-al20", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.333\\(c00e333r2p1t8\\)", }, { model: "mate 20 rs", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.135\\(c786e133r3p1\\)", }, { model: "columbia-l29d", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.350\\(c185e3r1p12t8\\)", }, { model: "charlotte-l09c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.311\\(c185e4r1p11t8\\)", }, { model: "p30", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.193", }, { model: "jackman-l22", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.247\\(c636e2r4p1t8\\)", }, { model: "honor v20", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.234\\(c00e234r4p3\\)", }, { model: "sydneym-l23", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.226\\(c605e2r1p1t8\\)", }, { model: "bla-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.321\\(c636e4r1p14t8\\)", }, { model: "honor 10 lite", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.283\\(c605e8r2p2\\)", }, { model: "ever-l29b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.310\\(c636e3r2p1\\)", }, { model: "sydneym-l01", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.215\\(c782e2r1p1t8\\)", }, { model: "cornell-l29a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.328\\(c636e2r1p12t8\\)", }, { model: "emily-l09c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.336\\(c605e4r1p12t8\\)", }, { model: "emily-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.311\\(c636e7r1p13t8\\)", }, { model: "p20", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.333\\(c00e333r1p1t8\\)", }, { model: "yale-l21a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.154\\(c636e2r2p1\\)", }, { model: "charlotte-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.325\\(c185e4r1p11t8\\)", }, { model: "bla-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.302\\(c635e4r1p13t8\\)", }, { model: "sydney-l21", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.215\\(c432e1r1p1t8\\)", }, { model: "sydney-l21", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.213\\(c185e1r1p1t8\\)", }, { model: "yale-l21a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.154\\(c432e2r3p2\\)", }, { model: "alp-l09", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.300\\(c432e4r1p9t8\\)", }, { model: "charlotte-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.345\\(c432e8r1p11t8\\)", }, { model: "honor 20", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.152\\(c00e150r5p1\\)", }, { model: "columbia-l29d", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.351\\(c432e5r1p13t8\\)", }, { model: "sydney-al00", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.212\\(c00e62r1p7t8\\)", }, { model: "cornell-al00a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.333\\(c00e333r1p1t8\\)", }, { model: "sydney-l21br", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.213\\(c185e1r1p2t8\\)", }, { model: "honor 8x", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.221\\(c461e2r1p1t8\\)", }, { model: "honor magic2", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.187", }, { model: "berkeley-l09", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.351\\(c432e5r1p13t8\\)", }, { model: "charlotte-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.336\\(c605e3r1p12t8\\)", }, { model: "charlotte-l09c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.345\\(c432e8r1p11t8\\)", }, { model: "ever-l29b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.310\\(c432e3r1p12\\)", }, { model: "charlotte-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.335\\(c636e3r1p13t8\\)", }, { model: "paris-l21meb", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.331\\(c185e4r1p3t8\\)", }, { model: "emily-l09c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.345\\(c432e10r1p12t8\\)", }, { model: "honor view 20", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.238\\(c432e1r3p1\\)", }, { model: "sydneym-l21", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.221\\(c461e1r1p1t8\\)", }, { model: "sydneym-l22", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.220\\(c635e1r1p2t8\\)", }, { model: "sydneym-l22", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.216\\(c569e1r1p1t8\\)", }, { model: "berkeley-l09", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.350\\(c636e4r1p13t8\\)", }, { model: "sydneym-l01", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.270\\(c432e3r1p1t8\\)", }, { model: "bla-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.330\\(c432e6r1p12t8\\)", }, { model: "alp-al00b", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.333(c00e333r2p1t8)", }, { model: "alp-l09", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.300(c432e4r1p9t8)", }, { model: "alp-l29", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.315(c636e5r1p13t8)", }, { model: "berkeley-al20", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.333(c00e333r2p1t8)", }, { model: "berkeley-l09", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.350(c10e3r1p14t8)", }, { model: "berkeley-l09", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.350(c636e4r1p13t8)", }, { model: "berkeley-l09", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.351(c432e5r1p13t8)", }, { model: "bla-l29c", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.302(c635e4r1p13t8)", }, { model: "bla-l29c", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.321(c636e4r1p14t8)", }, { model: "bla-l29c", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.330(c432e6r1p12t8)", }, { model: "honor10 lite <harry-al00c 9.1.0.217", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "y9 <jackman-l23 9.1.0.220", scope: null, trust: 0.6, vendor: "huawei", version: null, }, ], sources: [ { db: "CNVD", id: "CNVD-2019-33609", }, { db: "JVNDB", id: "JVNDB-2019-015525", }, { db: "NVD", id: "CVE-2019-5302", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:alp-al00b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.333\\(c00e333r2p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:alp-l09_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.300\\(c432e4r1p9t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:alp-l09:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:alp-l29_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.315\\(c636e5r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:alp-l29:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.321\\(c636e4r1p14t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.330\\(c432e6r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.302\\(c635e4r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:berkeley-al20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.333\\(c00e333r2p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:berkeley-al20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.350\\(c10e3r1p14t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.351\\(c432e5r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.350\\(c636e4r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:charlotte-l09c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.311\\(c185e4r1p11t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:charlotte-l09c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:charlotte-l09c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.345\\(c432e8r1p11t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:charlotte-l09c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.325\\(c185e4r1p11t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.335\\(c636e3r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.345\\(c432e8r1p11t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.336\\(c605e3r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.333\\(c00e333r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.350\\(c461e3r1p11t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.350\\(c185e3r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.350\\(c10e5r1p14t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.351\\(c432e5r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.333\\(c00e333r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cornell-al00a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.328\\(c185e1r1p9t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.328\\(c432e1r1p9t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.330\\(c461e1r1p9t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.328\\(c636e2r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:emily-l09c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.336\\(c605e4r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:emily-l09c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:emily-l09c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.311\\(c185e2r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:emily-l09c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:emily-l09c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.345\\(c432e10r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:emily-l09c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.311\\(c605e2r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.311\\(c636e7r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.311\\(c432e7r1p11t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.311\\(c185e3r3p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.310\\(c636e3r2p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.310\\(c432e3r1p12\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.131\\(c00e131r3p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.310\\(c185e10r2p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:mate_20_rs_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.135\\(c786e133r3p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:mate_20_rs:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:mate_20_x_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.135\\(c00e133r2p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.333\\(c00e333r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:p20_pro_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.333\\(c00e333r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:p20_pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.193", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.186\\(c00e180r2p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:y9_2019_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.220\\(c605e3r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nova_lite_3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.305\\(c635e8r2p2\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nova_lite_3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_10_lite_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.283\\(c605e8r2p2\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_8x_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.221\\(c461e2r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_8x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.238\\(c432e1r3p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:jackman-l22_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.247\\(c636e2r4p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:jackman-l22:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:paris-l21b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.331\\(c432e1r1p2t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:paris-l21b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:paris-l21meb_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.331\\(c185e4r1p3t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:paris-l21meb:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:paris-l29b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.331\\(c636e1r1p3t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:paris-l29b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.212\\(c00e62r1p7t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydney-l21_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.215\\(c432e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydney-l21:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydney-l21_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.213\\(c185e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydney-l21:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydney-l21br_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.213\\(c185e1r1p2t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydney-l21br:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydney-l22_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.258\\(c636e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydney-l22:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydney-l22br_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.258\\(c636e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydney-l22br:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.228\\(c00e78r1p7t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l01_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.215\\(c782e2r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l01:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l01_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.213\\(c185e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l01:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l01_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.270\\(c432e3r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l01:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l03_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.217\\(c605e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l03:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l21_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.221\\(c461e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l21:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l21_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.215\\(c432e4r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l21:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l22_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.259\\(c185e1r1p2t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l22:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l22_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.220\\(c635e1r1p2t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l22:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l22_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.216\\(c569e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l22:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l23_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.226\\(c605e2r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l23:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.154\\(c432e2r3p2\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.154\\(c461e2r2p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.154\\(c636e2r2p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.152\\(c00e150r5p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_magic2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.187", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_magic2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_v20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.234\\(c00e234r4p3\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_v20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2019-5302", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "These two vulnerabilities were discovered by Huawei internal testing.", sources: [ { db: "CNNVD", id: "CNNVD-201908-1095", }, ], trust: 0.6, }, cve: "CVE-2019-5302", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "MEDIUM", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 2.9, confidentialityImpact: "NONE", exploitabilityScore: 5.5, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", trust: 1, userInteractionRequired: false, vectorString: "AV:A/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Medium", accessVector: "Adjacent Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 2.9, confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2019-015525", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Low", trust: 0.8, userInteractionRequired: null, vectorString: "AV:A/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 6.1, confidentialityImpact: "NONE", exploitabilityScore: 6.5, id: "CNVD-2019-33609", impactScore: 6.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "MEDIUM", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "VULMON", availabilityImpact: "PARTIAL", baseScore: 2.9, confidentialityImpact: "NONE", exploitabilityScore: 5.5, id: "CVE-2019-5302", impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "LOW", trust: 0.1, userInteractionRequired: null, vectorString: "AV:A/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 1.6, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "High", attackVector: "Adjacent Network", author: "NVD", availabilityImpact: "High", baseScore: 5.3, baseSeverity: "Medium", confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2019-015525", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2019-5302", trust: 1, value: "MEDIUM", }, { author: "NVD", id: "JVNDB-2019-015525", trust: 0.8, value: "Medium", }, { author: "CNVD", id: "CNVD-2019-33609", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201908-1095", trust: 0.6, value: "MEDIUM", }, { author: "VULMON", id: "CVE-2019-5302", trust: 0.1, value: "LOW", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2019-33609", }, { db: "VULMON", id: "CVE-2019-5302", }, { db: "JVNDB", id: "JVNDB-2019-015525", }, { db: "NVD", id: "CVE-2019-5302", }, { db: "CNNVD", id: "CNNVD-201908-1095", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 1 out of 2 vulnerabilities. Different than CVE-2020-5303. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3). plural Huawei There is a vulnerability related to input confirmation on smartphones.Service operation interruption (DoS) It may be put into a state. Huawei Honor10 Lite and Huawei Y9 are both smartphones from China's Huawei. \n\nA denial of service vulnerability exists in Huawei Honor10 Lite Harry-AL00C versions earlier than 9.1.0.217 (C00E215R3P1) and before Huawei Y9 Jackman-L23 9.1.0.220 (C45E3R1P1T8). The vulnerability stems from the fact that the two fields are not duplicated when parsing ", sources: [ { db: "NVD", id: "CVE-2019-5302", }, { db: "JVNDB", id: "JVNDB-2019-015525", }, { db: "CNVD", id: "CNVD-2019-33609", }, { db: "VULMON", id: "CVE-2019-5302", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2019-5302", trust: 3.1, }, { db: "JVNDB", id: "JVNDB-2019-015525", trust: 0.8, }, { db: "CNVD", id: "CNVD-2019-33609", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-201908-1095", trust: 0.6, }, { db: "VULMON", id: "CVE-2019-5302", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2019-33609", }, { db: "VULMON", id: "CVE-2019-5302", }, { db: "JVNDB", id: "JVNDB-2019-015525", }, { db: "NVD", id: "CVE-2019-5302", }, { db: "CNNVD", id: "CNNVD-201908-1095", }, ], }, id: "VAR-202004-0618", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2019-33609", }, ], trust: 1.1818007292857142, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "Network device", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2019-33609", }, ], }, last_update_date: "2023-12-18T12:56:05.023000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20190814-01-mobile", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en", }, { title: "Patch for Huawei Honor10 Lite and Huawei Y9 Denial of Service Vulnerability", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/182801", }, { title: "Huawei Honor10 Lite and Huawei Y9 Security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=96759", }, { title: "Huawei Security Advisories: Two Denial of Service Vulnerabilities on Some Huawei Smartphones", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories&qid=88453f1b990572fac17211a1a9b849ea", }, ], sources: [ { db: "CNVD", id: "CNVD-2019-33609", }, { db: "VULMON", id: "CVE-2019-5302", }, { db: "JVNDB", id: "JVNDB-2019-015525", }, { db: "CNNVD", id: "CNNVD-201908-1095", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-20", trust: 1.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-015525", }, { db: "NVD", id: "CVE-2019-5302", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2019-5302", }, { trust: 1.2, url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190814-01-mobile-cn", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5302", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/20.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, ], sources: [ { db: "CNVD", id: "CNVD-2019-33609", }, { db: "VULMON", id: "CVE-2019-5302", }, { db: "JVNDB", id: "JVNDB-2019-015525", }, { db: "NVD", id: "CVE-2019-5302", }, { db: "CNNVD", id: "CNNVD-201908-1095", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2019-33609", }, { db: "VULMON", id: "CVE-2019-5302", }, { db: "JVNDB", id: "JVNDB-2019-015525", }, { db: "NVD", id: "CVE-2019-5302", }, { db: "CNNVD", id: "CNNVD-201908-1095", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-09-29T00:00:00", db: "CNVD", id: "CNVD-2019-33609", }, { date: "2020-04-27T00:00:00", db: "VULMON", id: "CVE-2019-5302", }, { date: "2020-06-01T00:00:00", db: "JVNDB", id: "JVNDB-2019-015525", }, { date: "2020-04-27T20:15:12.337000", db: "NVD", id: "CVE-2019-5302", }, { date: "2019-08-14T00:00:00", db: "CNNVD", id: "CNNVD-201908-1095", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-09-29T00:00:00", db: "CNVD", id: "CNVD-2019-33609", }, { date: "2020-05-05T00:00:00", db: "VULMON", id: "CVE-2019-5302", }, { date: "2020-06-01T00:00:00", db: "JVNDB", id: "JVNDB-2019-015525", }, { date: "2020-05-05T17:25:41.150000", db: "NVD", id: "CVE-2019-5302", }, { date: "2020-09-03T00:00:00", db: "CNNVD", id: "CNNVD-201908-1095", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote or local", sources: [ { db: "CNNVD", id: "CNNVD-201908-1095", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Input verification vulnerabilities on smartphones", sources: [ { db: "JVNDB", id: "JVNDB-2019-015525", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "input validation error", sources: [ { db: "CNNVD", id: "CNNVD-201908-1095", }, ], trust: 0.6, }, }
var-202004-0619
Vulnerability from variot
There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3). plural Huawei There is a vulnerability related to input confirmation on smartphones.Service operation interruption (DoS) It may be put into a state. Huawei Honor10 Lite and Huawei Y9 are both smartphones from China's Huawei.
A denial of service vulnerability exists in versions before Huawei Honor10 Lite Harry-AL00C 9.1.0.217 (C00E215R3P1) and before Huawei Y9 Jackman-L23 9.1.0.220 (C45E3R1P1T8)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", affected_products: { "@id": "https://www.variotdbs.pl/ref/affected_products", }, configurations: { "@id": "https://www.variotdbs.pl/ref/configurations", }, credits: { "@id": "https://www.variotdbs.pl/ref/credits", }, cvss: { "@id": "https://www.variotdbs.pl/ref/cvss/", }, description: { "@id": "https://www.variotdbs.pl/ref/description/", }, exploit_availability: { "@id": "https://www.variotdbs.pl/ref/exploit_availability/", }, external_ids: { "@id": "https://www.variotdbs.pl/ref/external_ids/", }, iot: { "@id": "https://www.variotdbs.pl/ref/iot/", }, iot_taxonomy: { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/", }, patch: { "@id": "https://www.variotdbs.pl/ref/patch/", }, problemtype_data: { "@id": "https://www.variotdbs.pl/ref/problemtype_data/", }, references: { "@id": "https://www.variotdbs.pl/ref/references/", }, sources: { "@id": "https://www.variotdbs.pl/ref/sources/", }, sources_release_date: { "@id": "https://www.variotdbs.pl/ref/sources_release_date/", }, sources_update_date: { "@id": "https://www.variotdbs.pl/ref/sources_update_date/", }, threat_type: { "@id": "https://www.variotdbs.pl/ref/threat_type/", }, title: { "@id": "https://www.variotdbs.pl/ref/title/", }, type: { "@id": "https://www.variotdbs.pl/ref/type/", }, }, "@id": "https://www.variotdbs.pl/vuln/VAR-202004-0619", affected_products: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { model: "sydneym-l03", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.217\\(c605e1r1p1t8\\)", }, { model: "berkeley-l09", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.350\\(c10e3r1p14t8\\)", }, { model: "sydney-l22", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.258\\(c636e1r1p1t8\\)", }, { model: "cornell-l29a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.328\\(c432e1r1p9t8\\)", }, { model: "y9 2019", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.220\\(c605e3r1p1t8\\)", }, { model: "emily-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.311\\(c605e2r1p12t8\\)", }, { model: "mate 20 pro", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.310\\(c185e10r2p1\\)", }, { model: "cornell-l29a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.330\\(c461e1r1p9t8\\)", }, { model: "alp-l29", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.315\\(c636e5r1p13t8\\)", }, { model: "mate 20", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.131\\(c00e131r3p1\\)", }, { model: "nova lite 3", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.305\\(c635e8r2p2\\)", }, { model: "sydney-l22br", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.258\\(c636e1r1p1t8\\)", }, { model: "sydneym-al00", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.228\\(c00e78r1p7t8\\)", }, { model: "sydneym-l22", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.259\\(c185e1r1p2t8\\)", }, { model: "sydneym-l01", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.213\\(c185e1r1p1t8\\)", }, { model: "yale-l21a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.154\\(c461e2r2p1\\)", }, { model: "cornell-l29a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.328\\(c185e1r1p9t8\\)", }, { model: "p20 pro", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.333\\(c00e333r1p1t8\\)", }, { model: "ever-l29b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.311\\(c185e3r3p1\\)", }, { model: "emily-l09c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.311\\(c185e2r1p12t8\\)", }, { model: "emily-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.311\\(c432e7r1p11t8\\)", }, { model: "alp-al00b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.333\\(c00e333r2p1t8\\)", }, { model: "mate 20 x", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.135\\(c00e133r2p1\\)", }, { model: "columbia-l29d", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.350\\(c10e5r1p14t8\\)", }, { model: "sydneym-l21", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.215\\(c432e4r1p1t8\\)", }, { model: "paris-l21b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.331\\(c432e1r1p2t8\\)", }, { model: "columbia-l29d", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.350\\(c461e3r1p11t8\\)", }, { model: "columbia-al10b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.333\\(c00e333r1p1t8\\)", }, { model: "paris-l29b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.331\\(c636e1r1p3t8\\)", }, { model: "p30 pro", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.186\\(c00e180r2p1\\)", }, { model: "berkeley-al20", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.333\\(c00e333r2p1t8\\)", }, { model: "mate 20 rs", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.135\\(c786e133r3p1\\)", }, { model: "columbia-l29d", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.350\\(c185e3r1p12t8\\)", }, { model: "charlotte-l09c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.311\\(c185e4r1p11t8\\)", }, { model: "p30", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.193", }, { model: "jackman-l22", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.247\\(c636e2r4p1t8\\)", }, { model: "honor v20", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.234\\(c00e234r4p3\\)", }, { model: "sydneym-l23", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.226\\(c605e2r1p1t8\\)", }, { model: "bla-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.321\\(c636e4r1p14t8\\)", }, { model: "honor 10 lite", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.283\\(c605e8r2p2\\)", }, { model: "ever-l29b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.310\\(c636e3r2p1\\)", }, { model: "sydneym-l01", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.215\\(c782e2r1p1t8\\)", }, { model: "cornell-l29a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.328\\(c636e2r1p12t8\\)", }, { model: "emily-l09c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.336\\(c605e4r1p12t8\\)", }, { model: "emily-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.311\\(c636e7r1p13t8\\)", }, { model: "p20", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.333\\(c00e333r1p1t8\\)", }, { model: "yale-l21a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.154\\(c636e2r2p1\\)", }, { model: "charlotte-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.325\\(c185e4r1p11t8\\)", }, { model: "bla-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.302\\(c635e4r1p13t8\\)", }, { model: "sydney-l21", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.215\\(c432e1r1p1t8\\)", }, { model: "sydney-l21", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.213\\(c185e1r1p1t8\\)", }, { model: "yale-l21a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.154\\(c432e2r3p2\\)", }, { model: "alp-l09", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.300\\(c432e4r1p9t8\\)", }, { model: "charlotte-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.345\\(c432e8r1p11t8\\)", }, { model: "honor 20", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.152\\(c00e150r5p1\\)", }, { model: "columbia-l29d", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.351\\(c432e5r1p13t8\\)", }, { model: "sydney-al00", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.212\\(c00e62r1p7t8\\)", }, { model: "cornell-al00a", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.333\\(c00e333r1p1t8\\)", }, { model: "sydney-l21br", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.213\\(c185e1r1p2t8\\)", }, { model: "honor 8x", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.221\\(c461e2r1p1t8\\)", }, { model: "honor magic2", scope: "lt", trust: 1, vendor: "huawei", version: "10.0.0.187", }, { model: "berkeley-l09", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.351\\(c432e5r1p13t8\\)", }, { model: "charlotte-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.336\\(c605e3r1p12t8\\)", }, { model: "charlotte-l09c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.345\\(c432e8r1p11t8\\)", }, { model: "ever-l29b", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.310\\(c432e3r1p12\\)", }, { model: "charlotte-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.335\\(c636e3r1p13t8\\)", }, { model: "paris-l21meb", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.331\\(c185e4r1p3t8\\)", }, { model: "emily-l09c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.345\\(c432e10r1p12t8\\)", }, { model: "honor view 20", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.238\\(c432e1r3p1\\)", }, { model: "sydneym-l21", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.221\\(c461e1r1p1t8\\)", }, { model: "sydneym-l22", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.220\\(c635e1r1p2t8\\)", }, { model: "sydneym-l22", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.216\\(c569e1r1p1t8\\)", }, { model: "berkeley-l09", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.350\\(c636e4r1p13t8\\)", }, { model: "sydneym-l01", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.270\\(c432e3r1p1t8\\)", }, { model: "bla-l29c", scope: "lt", trust: 1, vendor: "huawei", version: "9.1.0.330\\(c432e6r1p12t8\\)", }, { model: "berkeley-l09", scope: "eq", trust: 0.9, vendor: "huawei", version: "9.1.0.350(c10e3r1p14t8)", }, { model: "berkeley-l09", scope: "eq", trust: 0.9, vendor: "huawei", version: "9.1.0.350(c636e4r1p13t8)", }, { model: "bla-l29c", scope: "eq", trust: 0.9, vendor: "huawei", version: "9.1.0.302(c635e4r1p13t8)", }, { model: "bla-l29c", scope: "eq", trust: 0.9, vendor: "huawei", version: "9.1.0.321(c636e4r1p14t8)", }, { model: "alp-al00b", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.333(c00e333r2p1t8)", }, { model: "alp-l09", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.300(c432e4r1p9t8)", }, { model: "alp-l09", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.315(c636e5r1p13t8)", }, { model: "berkeley-al20", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.333(c00e333r2p1t8)", }, { model: "berkeley-l09", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.351(c432e5r1p13t8)", }, { model: "bla-l29c", scope: "eq", trust: 0.8, vendor: "huawei", version: "9.1.0.330(c432e6r1p12t8)", }, { model: "honor10 lite <harry-al00c 9.1.0.217", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "y9 <jackman-l23 9.1.0.220", scope: null, trust: 0.6, vendor: "huawei", version: null, }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.1.18d(c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.106(c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.113(sp2c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.113(sp3c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.113(sp7c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.118(c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.120(sp2c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.125(sp1c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.125(sp3c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.126(sp2c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.126(sp5c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.127(sp1c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.128(sp2c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.129", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.129(sp2c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.153(c00)", }, { model: "alp-al00b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.336(c00)", }, { model: "alp-l09", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "berkeley-al20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.105(c00)", }, { model: "berkeley-al20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.111(c00)", }, { model: "berkeley-al20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.112d(c00)", }, { model: "berkeley-al20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.116(c00)", }, { model: "berkeley-al20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.119(c00)", }, { model: "berkeley-al20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.119d(c00)", }, { model: "berkeley-al20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.122(c00)", }, { model: "berkeley-al20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.132(c00)", }, { model: "berkeley-al20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.132d(c00)", }, { model: "berkeley-al20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.142(c00)", }, { model: "berkeley-al20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.151(c00)", }, { model: "bla-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.127(c432)", }, { model: "bla-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.0.0.137(c432)", }, { model: "charlotte-l09c", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.311(c185e4r1p11t8)", }, { model: "charlotte-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.325(c185e4r1p11t8)", }, { model: "charlotte-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.335(c636e3r1p13t8)", }, { model: "charlotte-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.336(c605e3r1p12t8)", }, { model: "columbia-al10b", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.163(c00)", }, { model: "columbia-l29d", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.146(c461)", }, { model: "columbia-l29d", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.148(c185)", }, { model: "columbia-l29d", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.151(c10)", }, { model: "columbia-l29d", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.151(c432)", }, { model: "columbia-l29d", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.350(c10e5r1p14t8)", }, { model: "columbia-l29d", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.350(c185e3r1p12t8)", }, { model: "columbia-l29d", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.350(c461e3r1p11t8)", }, { model: "cornell-l29a", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.328(c185e1r1p9t8)", }, { model: "cornell-l29a", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.328(c432e1r1p9t8)", }, { model: "cornell-l29a", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.328(c636e2r1p12t8)", }, { model: "emily-l09c", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "emily-l09c", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.311(c185e2r1p12t8)", }, { model: "emily-l09c", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.336(c605e4r1p12t8)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.132a(c432)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.135(c782)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.154(c10)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.154(c461)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.154(c635)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.156(c185)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.156(c605)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.159(c636)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.311(c10e2r1p13t8)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.311(c185e2r1p12t8)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.311(c432e7r1p11t8)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.311(c461e2r1p11t8)", }, { model: "emily-l29c", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.311(c605e2r1p12t8)", }, { model: "ever-l29b", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.0.0.206(c185e3r3p1)", }, { model: "ever-l29b", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.0.0.207(c636e3r2p1)", }, { model: "ever-l29b", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.0.0.208(c432e3r1p12)", }, { model: "ever-l29b", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.310(c432e3r1p12)", }, { model: "ever-l29b", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.310(c636e3r2p1)", }, { model: "honor 10 lite", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "honor 10 lite", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.217(c00e215r3p1)", }, { model: "honor 8x", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "honor 8x", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.217(c00e15r3p2t8)", }, { model: "honor magic2", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "honor magic2", scope: "eq", trust: 0.1, vendor: "huawei", version: "10.0.0.175(c00e59r2p11)", }, { model: "honor v20", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "honor v20", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.0.1.161(c00e161r2p2)", }, { model: "jackman-l22", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.2.0.156(c636r2p2)", }, { model: "mate 20", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "mate 20 pro", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "mate 20 pro", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.135(c00e133r3p1)", }, { model: "mate 20 rs", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "p20", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "p20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.109", }, { model: "p20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.120", }, { model: "p20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.121", }, { model: "p20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.128", }, { model: "p20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.130", }, { model: "p20", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.1.0.171(c00)", }, { model: "p20 pro", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "p30", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "p30 pro", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "sydney-l21", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.213(c185e1r1p1t8)", }, { model: "sydneym-l01", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.213(c185e1r1p1t8)", }, { model: "sydneym-l01", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.215(c782e2r1p1t8)", }, { model: "sydneym-l21", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.215(c432e4r1p1t8)", }, { model: "sydneym-l22", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.216(c569e1r1p1t8)", }, { model: "sydneym-l22", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.220(c635e1r1p2t8)", }, { model: "y9 2019", scope: "eq", trust: 0.1, vendor: "huawei", version: null, }, { model: "y9 2019", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.2.0.160(c185r2p2)", }, { model: "y9 2019", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.2.0.162(c605)", }, { model: "y9 2019", scope: "eq", trust: 0.1, vendor: "huawei", version: "8.2.0.163(c605)", }, { model: "yale-l21a", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.154(c432e2r3p2)", }, { model: "yale-l21a", scope: "eq", trust: 0.1, vendor: "huawei", version: "9.1.0.154(c461e2r2p1)", }, ], sources: [ { db: "CNVD", id: "CNVD-2019-44785", }, { db: "VULMON", id: "CVE-2019-5303", }, { db: "JVNDB", id: "JVNDB-2019-015526", }, { db: "NVD", id: "CVE-2019-5303", }, ], }, configurations: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", children: { "@container": "@list", }, cpe_match: { "@container": "@list", }, data: { "@container": "@list", }, nodes: { "@container": "@list", }, }, data: [ { CVE_data_version: "4.0", nodes: [ { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:alp-al00b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.333\\(c00e333r2p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:alp-al00b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:alp-l09_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.300\\(c432e4r1p9t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:alp-l09:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:alp-l29_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.315\\(c636e5r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:alp-l29:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.321\\(c636e4r1p14t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.330\\(c432e6r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:bla-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.302\\(c635e4r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:bla-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:berkeley-al20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.333\\(c00e333r2p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:berkeley-al20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.350\\(c10e3r1p14t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.351\\(c432e5r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:berkeley-l09_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.350\\(c636e4r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:berkeley-l09:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:charlotte-l09c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.311\\(c185e4r1p11t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:charlotte-l09c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:charlotte-l09c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.345\\(c432e8r1p11t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:charlotte-l09c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.325\\(c185e4r1p11t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.335\\(c636e3r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.345\\(c432e8r1p11t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:charlotte-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.336\\(c605e3r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:charlotte-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:columbia-al10b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.333\\(c00e333r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:columbia-al10b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.350\\(c461e3r1p11t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.350\\(c185e3r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.350\\(c10e5r1p14t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:columbia-l29d_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.351\\(c432e5r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:columbia-l29d:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cornell-al00a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.333\\(c00e333r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cornell-al00a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.328\\(c185e1r1p9t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.328\\(c432e1r1p9t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.330\\(c461e1r1p9t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:cornell-l29a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.328\\(c636e2r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:cornell-l29a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:emily-l09c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.336\\(c605e4r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:emily-l09c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:emily-l09c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.311\\(c185e2r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:emily-l09c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:emily-l09c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.345\\(c432e10r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:emily-l09c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.311\\(c605e2r1p12t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.311\\(c636e7r1p13t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:emily-l29c_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.311\\(c432e7r1p11t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:emily-l29c:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.311\\(c185e3r3p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.310\\(c636e3r2p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:ever-l29b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.310\\(c432e3r1p12\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:ever-l29b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:mate_20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.131\\(c00e131r3p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:mate_20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.310\\(c185e10r2p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:mate_20_rs_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.135\\(c786e133r3p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:mate_20_rs:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:mate_20_x_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.135\\(c00e133r2p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:mate_20_x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:p20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.333\\(c00e333r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:p20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:p20_pro_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.333\\(c00e333r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:p20_pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.193", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:p30_pro_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.186\\(c00e180r2p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:p30_pro:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:y9_2019_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.220\\(c605e3r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:y9_2019:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:nova_lite_3_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.305\\(c635e8r2p2\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:nova_lite_3:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_10_lite_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.283\\(c605e8r2p2\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_10_lite:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_8x_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.221\\(c461e2r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_8x:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_view_20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.238\\(c432e1r3p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_view_20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:jackman-l22_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.247\\(c636e2r4p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:jackman-l22:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:paris-l21b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.331\\(c432e1r1p2t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:paris-l21b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:paris-l21meb_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.331\\(c185e4r1p3t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:paris-l21meb:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:paris-l29b_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.331\\(c636e1r1p3t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:paris-l29b:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydney-al00_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.212\\(c00e62r1p7t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydney-al00:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydney-l21_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.215\\(c432e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydney-l21:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydney-l21_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.213\\(c185e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydney-l21:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydney-l21br_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.213\\(c185e1r1p2t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydney-l21br:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydney-l22_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.258\\(c636e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydney-l22:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydney-l22br_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.258\\(c636e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydney-l22br:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-al00_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.228\\(c00e78r1p7t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-al00:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l01_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.215\\(c782e2r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l01:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l01_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.213\\(c185e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l01:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l01_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.270\\(c432e3r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l01:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l03_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.217\\(c605e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l03:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l21_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.221\\(c461e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l21:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l21_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.215\\(c432e4r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l21:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l22_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.259\\(c185e1r1p2t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l22:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l22_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.220\\(c635e1r1p2t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l22:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l22_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.216\\(c569e1r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l22:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:sydneym-l23_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.226\\(c605e2r1p1t8\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:sydneym-l23:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.154\\(c432e2r3p2\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.154\\(c461e2r2p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:yale-l21a_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.154\\(c636e2r2p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:yale-l21a:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.152\\(c00e150r5p1\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_magic2_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "10.0.0.187", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_magic2:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, { children: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:huawei:honor_v20_firmware:*:*:*:*:*:*:*:*", cpe_name: [], versionEndExcluding: "9.1.0.234\\(c00e234r4p3\\)", vulnerable: true, }, ], operator: "OR", }, { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:h:huawei:honor_v20:-:*:*:*:*:*:*:*", cpe_name: [], vulnerable: false, }, ], operator: "OR", }, ], cpe_match: [], operator: "AND", }, ], }, ], sources: [ { db: "NVD", id: "CVE-2019-5303", }, ], }, credits: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "These two vulnerabilities were discovered by Huawei internal testing.", sources: [ { db: "CNNVD", id: "CNNVD-201908-1092", }, ], trust: 0.6, }, cve: "CVE-2019-5303", cvss: { "@context": { cvssV2: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2", }, cvssV3: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#", }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/", }, severity: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#", }, "@id": "https://www.variotdbs.pl/ref/cvss/severity", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, "@id": "https://www.variotdbs.pl/ref/sources", }, }, data: [ { cvssV2: [ { acInsufInfo: false, accessComplexity: "MEDIUM", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "NVD", availabilityImpact: "PARTIAL", baseScore: 2.9, confidentialityImpact: "NONE", exploitabilityScore: 5.5, impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "LOW", trust: 1, userInteractionRequired: false, vectorString: "AV:A/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, { acInsufInfo: null, accessComplexity: "Medium", accessVector: "Adjacent Network", authentication: "None", author: "NVD", availabilityImpact: "Partial", baseScore: 2.9, confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2019-015526", impactScore: null, integrityImpact: "None", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "Low", trust: 0.8, userInteractionRequired: null, vectorString: "AV:A/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, { accessComplexity: "HIGH", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "CNVD", availabilityImpact: "COMPLETE", baseScore: 4.6, confidentialityImpact: "NONE", exploitabilityScore: 3.2, id: "CNVD-2019-44785", impactScore: 6.9, integrityImpact: "NONE", severity: "MEDIUM", trust: 0.6, vectorString: "AV:A/AC:H/Au:N/C:N/I:N/A:C", version: "2.0", }, { acInsufInfo: null, accessComplexity: "MEDIUM", accessVector: "ADJACENT_NETWORK", authentication: "NONE", author: "VULMON", availabilityImpact: "PARTIAL", baseScore: 2.9, confidentialityImpact: "NONE", exploitabilityScore: 5.5, id: "CVE-2019-5303", impactScore: 2.9, integrityImpact: "NONE", obtainAllPrivilege: null, obtainOtherPrivilege: null, obtainUserPrivilege: null, severity: "LOW", trust: 0.1, userInteractionRequired: null, vectorString: "AV:A/AC:M/Au:N/C:N/I:N/A:P", version: "2.0", }, ], cvssV3: [ { attackComplexity: "HIGH", attackVector: "ADJACENT_NETWORK", author: "NVD", availabilityImpact: "HIGH", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", exploitabilityScore: 1.6, impactScore: 3.6, integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", trust: 1, userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, { attackComplexity: "High", attackVector: "Adjacent Network", author: "NVD", availabilityImpact: "High", baseScore: 5.3, baseSeverity: "Medium", confidentialityImpact: "None", exploitabilityScore: null, id: "JVNDB-2019-015526", impactScore: null, integrityImpact: "None", privilegesRequired: "None", scope: "Unchanged", trust: 0.8, userInteraction: "None", vectorString: "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, ], severity: [ { author: "NVD", id: "CVE-2019-5303", trust: 1, value: "MEDIUM", }, { author: "NVD", id: "JVNDB-2019-015526", trust: 0.8, value: "Medium", }, { author: "CNVD", id: "CNVD-2019-44785", trust: 0.6, value: "MEDIUM", }, { author: "CNNVD", id: "CNNVD-201908-1092", trust: 0.6, value: "MEDIUM", }, { author: "VULMON", id: "CVE-2019-5303", trust: 0.1, value: "LOW", }, ], }, ], sources: [ { db: "CNVD", id: "CNVD-2019-44785", }, { db: "VULMON", id: "CVE-2019-5303", }, { db: "JVNDB", id: "JVNDB-2019-015526", }, { db: "NVD", id: "CVE-2019-5303", }, { db: "CNNVD", id: "CNNVD-201908-1092", }, ], }, description: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "There are two denial of service vulnerabilities on some Huawei smartphones. An attacker may send specially crafted TD-SCDMA messages from a rogue base station to the affected devices. Due to insufficient input validation of two values when parsing the messages, successful exploit may cause device abnormal. This is 2 out of 2 vulnerabilities. Different than CVE-2020-5302. Affected products are: ALP-AL00B: earlier than 9.1.0.333(C00E333R2P1T8) ALP-L09: earlier than 9.1.0.300(C432E4R1P9T8) ALP-L29: earlier than 9.1.0.315(C636E5R1P13T8) BLA-L29C: earlier than 9.1.0.321(C636E4R1P14T8), earlier than 9.1.0.330(C432E6R1P12T8), earlier than 9.1.0.302(C635E4R1P13T8) Berkeley-AL20: earlier than 9.1.0.333(C00E333R2P1T8) Berkeley-L09: earlier than 9.1.0.350(C10E3R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8), earlier than 9.1.0.350(C636E4R1P13T8) Charlotte-L09C: earlier than 9.1.0.311(C185E4R1P11T8), earlier than 9.1.0.345(C432E8R1P11T8) Charlotte-L29C: earlier than 9.1.0.325(C185E4R1P11T8), earlier than 9.1.0.335(C636E3R1P13T8), earlier than 9.1.0.345(C432E8R1P11T8), earlier than 9.1.0.336(C605E3R1P12T8) Columbia-AL10B: earlier than 9.1.0.333(C00E333R1P1T8) Columbia-L29D: earlier than 9.1.0.350(C461E3R1P11T8), earlier than 9.1.0.350(C185E3R1P12T8), earlier than 9.1.0.350(C10E5R1P14T8), earlier than 9.1.0.351(C432E5R1P13T8) Cornell-AL00A: earlier than 9.1.0.333(C00E333R1P1T8) Cornell-L29A: earlier than 9.1.0.328(C185E1R1P9T8), earlier than 9.1.0.328(C432E1R1P9T8), earlier than 9.1.0.330(C461E1R1P9T8), earlier than 9.1.0.328(C636E2R1P12T8) Emily-L09C: earlier than 9.1.0.336(C605E4R1P12T8), earlier than 9.1.0.311(C185E2R1P12T8), earlier than 9.1.0.345(C432E10R1P12T8) Emily-L29C: earlier than 9.1.0.311(C605E2R1P12T8), earlier than 9.1.0.311(C636E7R1P13T8), earlier than 9.1.0.311(C432E7R1P11T8) Ever-L29B: earlier than 9.1.0.311(C185E3R3P1), earlier than 9.1.0.310(C636E3R2P1), earlier than 9.1.0.310(C432E3R1P12) HUAWEI Mate 20: earlier than 9.1.0.131(C00E131R3P1) HUAWEI Mate 20 Pro: earlier than 9.1.0.310(C185E10R2P1) HUAWEI Mate 20 RS: earlier than 9.1.0.135(C786E133R3P1) HUAWEI Mate 20 X: earlier than 9.1.0.135(C00E133R2P1) HUAWEI P20: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P20 Pro: earlier than 9.1.0.333(C00E333R1P1T8) HUAWEI P30: earlier than 9.1.0.193 HUAWEI P30 Pro: earlier than 9.1.0.186(C00E180R2P1) HUAWEI Y9 2019: earlier than 9.1.0.220(C605E3R1P1T8) HUAWEI nova lite 3: earlier than 9.1.0.305(C635E8R2P2) Honor 10 Lite: earlier than 9.1.0.283(C605E8R2P2) Honor 8X: earlier than 9.1.0.221(C461E2R1P1T8) Honor View 20: earlier than 9.1.0.238(C432E1R3P1) Jackman-L22: earlier than 9.1.0.247(C636E2R4P1T8) Paris-L21B: earlier than 9.1.0.331(C432E1R1P2T8) Paris-L21MEB: earlier than 9.1.0.331(C185E4R1P3T8) Paris-L29B: earlier than 9.1.0.331(C636E1R1P3T8) Sydney-AL00: earlier than 9.1.0.212(C00E62R1P7T8) Sydney-L21: earlier than 9.1.0.215(C432E1R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8) Sydney-L21BR: earlier than 9.1.0.213(C185E1R1P2T8) Sydney-L22: earlier than 9.1.0.258(C636E1R1P1T8) Sydney-L22BR: earlier than 9.1.0.258(C636E1R1P1T8) SydneyM-AL00: earlier than 9.1.0.228(C00E78R1P7T8) SydneyM-L01: earlier than 9.1.0.215(C782E2R1P1T8), earlier than 9.1.0.213(C185E1R1P1T8), earlier than 9.1.0.270(C432E3R1P1T8) SydneyM-L03: earlier than 9.1.0.217(C605E1R1P1T8) SydneyM-L21: earlier than 9.1.0.221(C461E1R1P1T8), earlier than 9.1.0.215(C432E4R1P1T8) SydneyM-L22: earlier than 9.1.0.259(C185E1R1P2T8), earlier than 9.1.0.220(C635E1R1P2T8), earlier than 9.1.0.216(C569E1R1P1T8) SydneyM-L23: earlier than 9.1.0.226(C605E2R1P1T8) Yale-L21A: earlier than 9.1.0.154(C432E2R3P2), earlier than 9.1.0.154(C461E2R2P1), earlier than 9.1.0.154(C636E2R2P1) Honor 20: earlier than 9.1.0.152(C00E150R5P1) Honor Magic2: earlier than 10.0.0.187 Honor V20: earlier than 9.1.0.234(C00E234R4P3). plural Huawei There is a vulnerability related to input confirmation on smartphones.Service operation interruption (DoS) It may be put into a state. Huawei Honor10 Lite and Huawei Y9 are both smartphones from China's Huawei. \n\nA denial of service vulnerability exists in versions before Huawei Honor10 Lite Harry-AL00C 9.1.0.217 (C00E215R3P1) and before Huawei Y9 Jackman-L23 9.1.0.220 (C45E3R1P1T8)", sources: [ { db: "NVD", id: "CVE-2019-5303", }, { db: "JVNDB", id: "JVNDB-2019-015526", }, { db: "CNVD", id: "CNVD-2019-44785", }, { db: "VULMON", id: "CVE-2019-5303", }, ], trust: 2.25, }, external_ids: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { db: "NVD", id: "CVE-2019-5303", trust: 3.1, }, { db: "JVNDB", id: "JVNDB-2019-015526", trust: 0.8, }, { db: "CNVD", id: "CNVD-2019-44785", trust: 0.6, }, { db: "CNNVD", id: "CNNVD-201908-1092", trust: 0.6, }, { db: "VULMON", id: "CVE-2019-5303", trust: 0.1, }, ], sources: [ { db: "CNVD", id: "CNVD-2019-44785", }, { db: "VULMON", id: "CVE-2019-5303", }, { db: "JVNDB", id: "JVNDB-2019-015526", }, { db: "NVD", id: "CVE-2019-5303", }, { db: "CNNVD", id: "CNNVD-201908-1092", }, ], }, id: "VAR-202004-0619", iot: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: true, sources: [ { db: "CNVD", id: "CNVD-2019-44785", }, ], trust: 1.1818007292857142, }, iot_taxonomy: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { category: [ "IoT", ], sub_category: null, trust: 0.6, }, ], sources: [ { db: "CNVD", id: "CNVD-2019-44785", }, ], }, last_update_date: "2023-12-18T14:04:45.203000Z", patch: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { title: "huawei-sa-20190814-01-mobile", trust: 0.8, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en", }, { title: "Patch for Huawei Honor10 Lite and Huawei Y9 Denial of Service Vulnerability (CNVD-2019-44785)", trust: 0.6, url: "https://www.cnvd.org.cn/patchinfo/show/193773", }, { title: "Huawei Honor10 Lite and Huawei Y9 Security vulnerabilities", trust: 0.6, url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=96758", }, { title: "Huawei Security Advisories: Two Denial of Service Vulnerabilities on Some Huawei Smartphones", trust: 0.1, url: "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories&qid=88453f1b990572fac17211a1a9b849ea", }, ], sources: [ { db: "CNVD", id: "CNVD-2019-44785", }, { db: "VULMON", id: "CVE-2019-5303", }, { db: "JVNDB", id: "JVNDB-2019-015526", }, { db: "CNNVD", id: "CNNVD-201908-1092", }, ], }, problemtype_data: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { problemtype: "CWE-20", trust: 1.8, }, ], sources: [ { db: "JVNDB", id: "JVNDB-2019-015526", }, { db: "NVD", id: "CVE-2019-5303", }, ], }, references: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", data: { "@container": "@list", }, sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: [ { trust: 1.7, url: "https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190814-01-mobile-en", }, { trust: 1.4, url: "https://nvd.nist.gov/vuln/detail/cve-2019-5303", }, { trust: 1.2, url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190814-01-mobile-cn", }, { trust: 0.8, url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5303", }, { trust: 0.1, url: "https://cwe.mitre.org/data/definitions/20.html", }, { trust: 0.1, url: "https://nvd.nist.gov", }, { trust: 0.1, url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/165364", }, ], sources: [ { db: "CNVD", id: "CNVD-2019-44785", }, { db: "VULMON", id: "CVE-2019-5303", }, { db: "JVNDB", id: "JVNDB-2019-015526", }, { db: "NVD", id: "CVE-2019-5303", }, { db: "CNNVD", id: "CNNVD-201908-1092", }, ], }, sources: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", data: { "@container": "@list", }, }, data: [ { db: "CNVD", id: "CNVD-2019-44785", }, { db: "VULMON", id: "CVE-2019-5303", }, { db: "JVNDB", id: "JVNDB-2019-015526", }, { db: "NVD", id: "CVE-2019-5303", }, { db: "CNNVD", id: "CNNVD-201908-1092", }, ], }, sources_release_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-12-11T00:00:00", db: "CNVD", id: "CNVD-2019-44785", }, { date: "2020-04-27T00:00:00", db: "VULMON", id: "CVE-2019-5303", }, { date: "2020-06-01T00:00:00", db: "JVNDB", id: "JVNDB-2019-015526", }, { date: "2020-04-27T20:15:12.397000", db: "NVD", id: "CVE-2019-5303", }, { date: "2019-08-14T00:00:00", db: "CNNVD", id: "CNNVD-201908-1092", }, ], }, sources_update_date: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", data: { "@container": "@list", }, }, data: [ { date: "2019-12-11T00:00:00", db: "CNVD", id: "CNVD-2019-44785", }, { date: "2020-05-05T00:00:00", db: "VULMON", id: "CVE-2019-5303", }, { date: "2020-06-01T00:00:00", db: "JVNDB", id: "JVNDB-2019-015526", }, { date: "2020-05-05T17:37:35.897000", db: "NVD", id: "CVE-2019-5303", }, { date: "2020-09-03T00:00:00", db: "CNNVD", id: "CNNVD-201908-1092", }, ], }, threat_type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "remote or local", sources: [ { db: "CNNVD", id: "CNNVD-201908-1092", }, ], trust: 0.6, }, title: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "plural Huawei Input verification vulnerabilities on smartphones", sources: [ { db: "JVNDB", id: "JVNDB-2019-015526", }, ], trust: 0.8, }, type: { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", sources: { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", }, }, }, data: "input validation error", sources: [ { db: "CNNVD", id: "CNNVD-201908-1092", }, ], trust: 0.6, }, }