All the vulnerabilites related to Huawei - Magic UI
var-202112-0348
Vulnerability from variot
There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage. plural Huawei A vulnerability related to exceptional state handling exists in smartphone products.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0348", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37052" } ] }, "cve": "CVE-2021-37052", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37052", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398885", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37052", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37052", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2018", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398885", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage. plural Huawei A vulnerability related to exceptional state handling exists in smartphone products.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "VULHUB", "id": "VHN-398885" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37052", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015860", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2018", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398885", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "id": "VAR-202112-0348", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398885" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.365000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Exception\u00a0log\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173786" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.1 }, { "problemtype": "Improper handling in exceptional conditions (CWE-755) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37052" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398885" }, { "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "db": "NVD", "id": "CVE-2021-37052" }, { "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398885" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "date": "2021-12-08T15:15:09.593000", "db": "NVD", "id": "CVE-2021-37052" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398885" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015860" }, { "date": "2021-12-09T17:53:01.237000", "db": "NVD", "id": "CVE-2021-37052" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2018" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2018" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to exceptional state handling in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015860" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2018" } ], "trust": 0.6 } }
var-202204-1557
Vulnerability from variot
The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in a permission management vulnerability.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1557", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22257" } ] }, "cve": "CVE-2022-22257", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22257", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409786", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22257", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22257", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2023", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409786", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22257", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in a permission management vulnerability.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22257", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007943", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2023", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-52825", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409786", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22257", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "id": "VAR-202204-1557", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409786" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:10.927000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189780" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22257" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22257/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/269.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409786" }, { "db": "VULMON", "id": "CVE-2022-22257" }, { "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "db": "NVD", "id": "CVE-2022-22257" }, { "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409786" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22257" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "date": "2022-04-11T20:15:19.703000", "db": "NVD", "id": "CVE-2022-22257" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-18T00:00:00", "db": "VULHUB", "id": "VHN-409786" }, { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2022-22257" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007943" }, { "date": "2022-04-18T18:13:50.083000", "db": "NVD", "id": "CVE-2022-22257" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2023" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2023" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product permission management vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007943" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2023" } ], "trust": 0.6 } }
var-202207-1150
Vulnerability from variot
Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-1150", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40016" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40016" } ] }, "cve": "CVE-2021-40016", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-401417", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "CVE-2021-40016", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "LOW", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40016", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-1040", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401417", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-40016", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401417" }, { "db": "VULMON", "id": "CVE-2021-40016" }, { "db": "NVD", "id": "CVE-2021-40016" }, { "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-40016" }, { "db": "VULHUB", "id": "VHN-401417" }, { "db": "VULMON", "id": "CVE-2021-40016" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40016", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202207-1040", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401417", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40016", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401417" }, { "db": "VULMON", "id": "CVE-2021-40016" }, { "db": "NVD", "id": "CVE-2021-40016" }, { "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "id": "VAR-202207-1150", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401417" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:22.629000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200417" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401417" }, { "db": "NVD", "id": "CVE-2021-40016" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40016/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/863.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401417" }, { "db": "VULMON", "id": "CVE-2021-40016" }, { "db": "NVD", "id": "CVE-2021-40016" }, { "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401417" }, { "db": "VULMON", "id": "CVE-2021-40016" }, { "db": "NVD", "id": "CVE-2021-40016" }, { "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401417" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-40016" }, { "date": "2022-07-12T14:15:14.760000", "db": "NVD", "id": "CVE-2021-40016" }, { "date": "2022-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-15T00:00:00", "db": "VULHUB", "id": "VHN-401417" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2021-40016" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-40016" }, { "date": "2022-07-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1040" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1040" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI Magic UI Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1040" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1040" } ], "trust": 0.6 } }
var-202112-0943
Vulnerability from variot
There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei.
A security vulnerability exists in the Huawei HarmonyOS HwConnectivityExService service. Huawei HarmonyOS is an operating system. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0943", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39998" } ] }, "cve": "CVE-2021-39998", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39998", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-05169", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401399", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39998", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39998", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-05169", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-215", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401399", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is Vulnerability of APIs being concurrently called for multiple times in HwConnectivityExService a in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei. \n\r\n\r\nA security vulnerability exists in the Huawei HarmonyOS HwConnectivityExService service. Huawei HarmonyOS is an operating system. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39998", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017518", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05169", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-215", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401399", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "id": "VAR-202112-0943", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" } ] }, "last_update_date": "2023-12-18T12:42:10.325000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Unknown vulnerability exists in Huawei HarmonyOS HwConnectivityExService service", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/315101" }, { "title": "Huawei HarmonyOS and Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172739" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39998" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05169" }, { "db": "VULHUB", "id": "VHN-401399" }, { "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "db": "NVD", "id": "CVE-2021-39998" }, { "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05169" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401399" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "date": "2022-01-10T14:10:20.877000", "db": "NVD", "id": "CVE-2021-39998" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05169" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401399" }, { "date": "2023-01-24T05:49:00", "db": "JVNDB", "id": "JVNDB-2021-017518" }, { "date": "2022-01-13T02:10:20.940000", "db": "NVD", "id": "CVE-2021-39998" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-215" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-215" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017518" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-215" } ], "trust": 0.6 } }
var-202201-1716
Vulnerability from variot
There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. A resource management error vulnerability exists in Huawei HarmonyOS due to repeated calls to freed pointers by the product's camera component
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1716", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40039" } ] }, "cve": "CVE-2021-40039", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40039", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401440", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40039", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40039", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-294", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401440", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. A resource management error vulnerability exists in Huawei HarmonyOS due to repeated calls to freed pointers by the product\u0027s camera component", "sources": [ { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "VULHUB", "id": "VHN-401440" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40039", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002911", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-294", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04996", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401440", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "id": "VAR-202201-1716", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401440" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:33.617000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177450" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40039" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401440" }, { "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "db": "NVD", "id": "CVE-2021-40039" }, { "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401440" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "date": "2022-01-10T14:10:22.937000", "db": "NVD", "id": "CVE-2021-40039" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401440" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002911" }, { "date": "2022-01-13T15:37:04.397000", "db": "NVD", "id": "CVE-2021-40039" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-294" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-294" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 In the product \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002911" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-294" } ], "trust": 0.6 } }
var-202101-0999
Vulnerability from variot
There is a improper input validation vulnerability in some Huawei Smartphone.Successful exploit of this vulnerability can cause memory access errors and denial of service. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company. The following products and models are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0999", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "NVD", "id": "CVE-2020-9139" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9139" } ] }, "cve": "CVE-2020-9139", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9139", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-187264", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9139", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9139", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202101-1041", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-187264", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187264" }, { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "NVD", "id": "CVE-2020-9139" }, { "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a improper input validation vulnerability in some Huawei Smartphone.Successful exploit of this vulnerability can cause memory access errors and denial of service. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company. The following products and models are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1", "sources": [ { "db": "NVD", "id": "CVE-2020-9139" }, { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "VULHUB", "id": "VHN-187264" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9139", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015405", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1041", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187264", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187264" }, { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "NVD", "id": "CVE-2020-9139" }, { "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "id": "VAR-202101-0999", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187264" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:29.718000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Huawei Emui and Honor Magic Ui Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139431" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187264" }, { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "NVD", "id": "CVE-2020-9139" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9139" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187264" }, { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "NVD", "id": "CVE-2020-9139" }, { "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187264" }, { "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "db": "NVD", "id": "CVE-2020-9139" }, { "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187264" }, { "date": "2021-09-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "date": "2021-01-13T22:15:13.943000", "db": "NVD", "id": "CVE-2020-9139" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-19T00:00:00", "db": "VULHUB", "id": "VHN-187264" }, { "date": "2021-09-21T09:03:00", "db": "JVNDB", "id": "JVNDB-2020-015405" }, { "date": "2021-01-19T15:01:41.620000", "db": "NVD", "id": "CVE-2020-9139" }, { "date": "2021-01-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1041" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1041" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to input confirmation on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015405" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1041" } ], "trust": 0.6 } }
var-202209-1059
Vulnerability from variot
Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1059", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "NVD", "id": "CVE-2020-36600" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-36600" } ] }, "cve": "CVE-2020-36600", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-36600", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-36600", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-1306", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "NVD", "id": "CVE-2020-36600" }, { "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2020-36600" }, { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "VULHUB", "id": "VHN-430126" }, { "db": "VULMON", "id": "CVE-2020-36600" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-36600", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017278", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1306", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430126", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-36600", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430126" }, { "db": "VULMON", "id": "CVE-2020-36600" }, { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "NVD", "id": "CVE-2020-36600" }, { "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "id": "VAR-202209-1059", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430126" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:12.050000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI and Huawei Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208466" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430126" }, { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "NVD", "id": "CVE-2020-36600" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36600" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2020-36600/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430126" }, { "db": "VULMON", "id": "CVE-2020-36600" }, { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "NVD", "id": "CVE-2020-36600" }, { "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430126" }, { "db": "VULMON", "id": "CVE-2020-36600" }, { "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "db": "NVD", "id": "CVE-2020-36600" }, { "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-430126" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2020-36600" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "date": "2022-09-16T18:15:11.347000", "db": "NVD", "id": "CVE-2020-36600" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-430126" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2020-36600" }, { "date": "2023-10-11T08:56:00", "db": "JVNDB", "id": "JVNDB-2022-017278" }, { "date": "2022-09-20T18:18:30.113000", "db": "NVD", "id": "CVE-2020-36600" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1306" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1306" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017278" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1306" } ], "trust": 0.6 } }
var-202106-0611
Vulnerability from variot
There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of insufficient input verification may cause the system to restart. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. An attacker could exploit this vulnerability to cause a system reboot. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0611", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22349" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22349" } ] }, "cve": "CVE-2021-22349", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380784", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22349", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22349", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-2009", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380784", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22349", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380784" }, { "db": "VULMON", "id": "CVE-2021-22349" }, { "db": "NVD", "id": "CVE-2021-22349" }, { "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of insufficient input verification may cause the system to restart. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. An attacker could exploit this vulnerability to cause a system reboot. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22349" }, { "db": "VULHUB", "id": "VHN-380784" }, { "db": "VULMON", "id": "CVE-2021-22349" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22349", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2009", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380784", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22349", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380784" }, { "db": "VULMON", "id": "CVE-2021-22349" }, { "db": "NVD", "id": "CVE-2021-22349" }, { "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "id": "VAR-202106-0611", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380784" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:10.081000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for Huawei smartphone input verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156087" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380784" }, { "db": "NVD", "id": "CVE-2021-22349" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22349" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380784" }, { "db": "VULMON", "id": "CVE-2021-22349" }, { "db": "NVD", "id": "CVE-2021-22349" }, { "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380784" }, { "db": "VULMON", "id": "CVE-2021-22349" }, { "db": "NVD", "id": "CVE-2021-22349" }, { "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380784" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22349" }, { "date": "2021-06-30T21:15:09.797000", "db": "NVD", "id": "CVE-2021-22349" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380784" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22349" }, { "date": "2021-07-06T18:51:39.057000", "db": "NVD", "id": "CVE-2021-22349" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2009" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2009" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone input verification error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2009" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2009" } ], "trust": 0.6 } }
var-202111-1591
Vulnerability from variot
There is a Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Digital Balance to fail to work. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are bypass vulnerabilities in Huawei Emui and Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1591", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "NVD", "id": "CVE-2021-37032" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37032" } ] }, "cve": "CVE-2021-37032", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37032", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398865", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37032", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37032", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202111-1897", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398865", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398865" }, { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "NVD", "id": "CVE-2021-37032" }, { "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Digital Balance to fail to work. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are bypass vulnerabilities in Huawei Emui and Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-37032" }, { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "VULHUB", "id": "VHN-398865" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37032", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015554", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1897", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102866", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398865", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398865" }, { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "NVD", "id": "CVE-2021-37032" }, { "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "id": "VAR-202111-1591", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398865" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:31.224000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "Huawei Emui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172194" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "NVD", "id": "CVE-2021-37032" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37032" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398865" }, { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "NVD", "id": "CVE-2021-37032" }, { "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398865" }, { "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "db": "NVD", "id": "CVE-2021-37032" }, { "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398865" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "date": "2021-11-23T16:15:09.790000", "db": "NVD", "id": "CVE-2021-37032" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398865" }, { "date": "2022-11-24T06:23:00", "db": "JVNDB", "id": "JVNDB-2021-015554" }, { "date": "2021-12-09T17:57:50.020000", "db": "NVD", "id": "CVE-2021-37032" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1897" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1897" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015554" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1897" } ], "trust": 0.6 } }
var-202110-1476
Vulnerability from variot
There is a Register tampering vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow the register value to be modified. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1476", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "NVD", "id": "CVE-2021-37001" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37001" } ] }, "cve": "CVE-2021-37001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37001", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-397930", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37001", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37001", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2101", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-397930", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-37001", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-397930" }, { "db": "VULMON", "id": "CVE-2021-37001" }, { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "NVD", "id": "CVE-2021-37001" }, { "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Register tampering vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow the register value to be modified. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-37001" }, { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "VULHUB", "id": "VHN-397930" }, { "db": "VULMON", "id": "CVE-2021-37001" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37001", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014258", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2101", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-397930", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37001", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-397930" }, { "db": "VULMON", "id": "CVE-2021-37001" }, { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "NVD", "id": "CVE-2021-37001" }, { "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "id": "VAR-202110-1476", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-397930" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:16.959000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-37001", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171642" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "NVD", "id": "CVE-2021-37001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37001" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-397930" }, { "db": "VULMON", "id": "CVE-2021-37001" }, { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "NVD", "id": "CVE-2021-37001" }, { "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-397930" }, { "db": "VULMON", "id": "CVE-2021-37001" }, { "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "db": "NVD", "id": "CVE-2021-37001" }, { "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-397930" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-37001" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "date": "2021-10-28T13:15:11.387000", "db": "NVD", "id": "CVE-2021-37001" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-397930" }, { "date": "2021-11-01T00:00:00", "db": "VULMON", "id": "CVE-2021-37001" }, { "date": "2022-10-11T08:33:00", "db": "JVNDB", "id": "JVNDB-2021-014258" }, { "date": "2021-11-01T20:50:39.007000", "db": "NVD", "id": "CVE-2021-37001" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2101" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2101" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014258" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2101" } ], "trust": 0.6 } }
var-202108-2207
Vulnerability from variot
A component of the Huawei smartphone has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution. plural Huawei Smartphone products contain vulnerabilities related to the leakage of resources to the wrong area.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2207", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "NVD", "id": "CVE-2021-22385" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22385" } ] }, "cve": "CVE-2021-22385", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.2, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22385", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-380820", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22385", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22385", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-975", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380820", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22385", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380820" }, { "db": "VULMON", "id": "CVE-2021-22385" }, { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "NVD", "id": "CVE-2021-22385" }, { "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the Huawei smartphone has a External Control of System or Configuration Setting vulnerability. Local attackers may exploit this vulnerability to cause Kernel Code Execution. plural Huawei Smartphone products contain vulnerabilities related to the leakage of resources to the wrong area.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22385" }, { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "VULHUB", "id": "VHN-380820" }, { "db": "VULMON", "id": "CVE-2021-22385" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22385", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009783", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-975", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380820", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22385", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380820" }, { "db": "VULMON", "id": "CVE-2021-22385" }, { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "NVD", "id": "CVE-2021-22385" }, { "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "id": "VAR-202108-2207", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380820" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:27.892000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22385", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159368" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.1 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380820" }, { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "NVD", "id": "CVE-2021-22385" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22385" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202106-0000001165452077" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/863.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380820" }, { "db": "VULMON", "id": "CVE-2021-22385" }, { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "NVD", "id": "CVE-2021-22385" }, { "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380820" }, { "db": "VULMON", "id": "CVE-2021-22385" }, { "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "db": "NVD", "id": "CVE-2021-22385" }, { "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-10T00:00:00", "db": "VULHUB", "id": "VHN-380820" }, { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22385" }, { "date": "2022-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "date": "2021-08-10T14:15:07.173000", "db": "NVD", "id": "CVE-2021-22385" }, { "date": "2021-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380820" }, { "date": "2021-08-17T00:00:00", "db": "VULMON", "id": "CVE-2021-22385" }, { "date": "2022-05-23T08:41:00", "db": "JVNDB", "id": "JVNDB-2021-009783" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22385" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-975" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-975" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability in leaking resources to the wrong area in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009783" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-975" } ], "trust": 0.6 } }
var-202112-0344
Vulnerability from variot
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0344", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37074" } ] }, "cve": "CVE-2021-37074", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 9.3, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-37074", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-398908", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37074", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37074", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2036", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398908", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "VULHUB", "id": "VHN-398908" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37074", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015864", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2036", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398908", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "id": "VAR-202112-0344", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398908" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:58.499000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Race\u00a0condition\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173794" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37074" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398908" }, { "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "db": "NVD", "id": "CVE-2021-37074" }, { "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398908" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "date": "2021-12-08T15:15:09.807000", "db": "NVD", "id": "CVE-2021-37074" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398908" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015864" }, { "date": "2021-12-09T17:55:40.317000", "db": "NVD", "id": "CVE-2021-37074" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2036" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2036" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Race Condition Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015864" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2036" } ], "trust": 0.6 } }
var-202107-1679
Vulnerability from variot
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1679", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22426" } ] }, "cve": "CVE-2021-22426", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22426", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380861", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22426", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22426", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2226", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380861", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "VULHUB", "id": "VHN-380861" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22426", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018585", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2226", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380861", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "id": "VAR-202107-1679", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380861" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:30.920000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202107-0000001170634565 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172003" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22426" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22426/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380861" }, { "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "db": "NVD", "id": "CVE-2021-22426" }, { "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380861" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "date": "2022-02-25T19:15:09.207000", "db": "NVD", "id": "CVE-2021-22426" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380861" }, { "date": "2023-06-30T08:24:00", "db": "JVNDB", "id": "JVNDB-2021-018585" }, { "date": "2022-03-07T17:50:39.693000", "db": "NVD", "id": "CVE-2021-22426" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2226" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2226" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018585" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2226" } ], "trust": 0.6 } }
var-202106-0614
Vulnerability from variot
There is a Configuration Defect Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0614", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22352" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22352" } ] }, "cve": "CVE-2021-22352", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-380787", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-22352", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22352", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-2010", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380787", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22352", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380787" }, { "db": "VULMON", "id": "CVE-2021-22352" }, { "db": "NVD", "id": "CVE-2021-22352" }, { "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration Defect Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22352" }, { "db": "VULHUB", "id": "VHN-380787" }, { "db": "VULMON", "id": "CVE-2021-22352" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22352", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2010", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380787", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22352", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380787" }, { "db": "VULMON", "id": "CVE-2021-22352" }, { "db": "NVD", "id": "CVE-2021-22352" }, { "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "id": "VAR-202106-0614", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380787" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:32.686000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for vulnerabilities in processing logic errors in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156088" }, { "title": "CVE-2021-22352", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22352 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22352" }, { "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22352" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22352" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22352" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380787" }, { "db": "VULMON", "id": "CVE-2021-22352" }, { "db": "NVD", "id": "CVE-2021-22352" }, { "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380787" }, { "db": "VULMON", "id": "CVE-2021-22352" }, { "db": "NVD", "id": "CVE-2021-22352" }, { "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380787" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22352" }, { "date": "2021-06-30T21:15:09.907000", "db": "NVD", "id": "CVE-2021-22352" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380787" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22352" }, { "date": "2021-07-06T19:45:17.737000", "db": "NVD", "id": "CVE-2021-22352" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2010" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2010" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone processing logic error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2010" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "handling logic errors", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2010" } ], "trust": 0.6 } }
var-202204-1427
Vulnerability from variot
The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1427", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46742" } ] }, "cve": "CVE-2021-46742", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46742", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-418651", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46742", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46742", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202204-2022", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-418651", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46742", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is tampered with and service operation is interrupted (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. An attacker could exploit this vulnerability to bypass web authentication and gain administrative access to the device", "sources": [ { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46742", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007971", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2022", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44618", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418651", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46742", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "id": "VAR-202204-1427", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418651" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:09.766000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189573" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46742" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46742/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418651" }, { "db": "VULMON", "id": "CVE-2021-46742" }, { "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "db": "NVD", "id": "CVE-2021-46742" }, { "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-418651" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2021-46742" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "date": "2022-04-11T20:15:16.397000", "db": "NVD", "id": "CVE-2021-46742" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-418651" }, { "date": "2022-04-15T00:00:00", "db": "VULMON", "id": "CVE-2021-46742" }, { "date": "2023-07-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-007971" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-46742" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2022" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2022" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007971" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2022" } ], "trust": 0.6 } }
var-202110-1481
Vulnerability from variot
There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1481", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "NVD", "id": "CVE-2021-36995" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36995" } ] }, "cve": "CVE-2021-36995", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36995", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398828", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36995", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36995", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2094", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398828", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398828" }, { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "NVD", "id": "CVE-2021-36995" }, { "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-36995" }, { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "VULHUB", "id": "VHN-398828" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36995", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014263", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2094", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398828", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398828" }, { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "NVD", "id": "CVE-2021-36995" }, { "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "id": "VAR-202110-1481", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398828" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:02.310000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36995", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168231" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "NVD", "id": "CVE-2021-36995" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36995" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398828" }, { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "NVD", "id": "CVE-2021-36995" }, { "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398828" }, { "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "db": "NVD", "id": "CVE-2021-36995" }, { "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398828" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "date": "2021-10-28T13:15:10.787000", "db": "NVD", "id": "CVE-2021-36995" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398828" }, { "date": "2022-10-11T08:47:00", "db": "JVNDB", "id": "JVNDB-2021-014263" }, { "date": "2021-11-01T21:24:48.403000", "db": "NVD", "id": "CVE-2021-36995" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2094" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2094" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014263" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2094" } ], "trust": 0.6 } }
var-202106-0594
Vulnerability from variot
There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0594", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22370" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22370" } ] }, "cve": "CVE-2021-22370", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380805", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22370", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22370", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1982", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380805", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22370", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380805" }, { "db": "VULMON", "id": "CVE-2021-22370" }, { "db": "NVD", "id": "CVE-2021-22370" }, { "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22370" }, { "db": "VULHUB", "id": "VHN-380805" }, { "db": "VULMON", "id": "CVE-2021-22370" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22370", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1982", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380805", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22370", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380805" }, { "db": "VULMON", "id": "CVE-2021-22370" }, { "db": "NVD", "id": "CVE-2021-22370" }, { "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "id": "VAR-202106-0594", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380805" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:25.747000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156066" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22370" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/522.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380805" }, { "db": "VULMON", "id": "CVE-2021-22370" }, { "db": "NVD", "id": "CVE-2021-22370" }, { "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380805" }, { "db": "VULMON", "id": "CVE-2021-22370" }, { "db": "NVD", "id": "CVE-2021-22370" }, { "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380805" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22370" }, { "date": "2021-06-30T14:15:08.590000", "db": "NVD", "id": "CVE-2021-22370" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380805" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22370" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22370" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1982" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1982" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1982" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1982" } ], "trust": 0.6 } }
var-202108-2218
Vulnerability from variot
There is an Improper Control of Dynamically Managing Code Resources Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to remotely execute commands. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2218", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "NVD", "id": "CVE-2021-22387" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22387" } ] }, "cve": "CVE-2021-22387", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22387", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380822", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22387", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22387", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-103", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380822", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22387", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380822" }, { "db": "VULMON", "id": "CVE-2021-22387" }, { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "NVD", "id": "CVE-2021-22387" }, { "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Control of Dynamically Managing Code Resources Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to remotely execute commands. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22387" }, { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "VULHUB", "id": "VHN-380822" }, { "db": "VULMON", "id": "CVE-2021-22387" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22387", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010879", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-103", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380822", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22387", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380822" }, { "db": "VULMON", "id": "CVE-2021-22387" }, { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "NVD", "id": "CVE-2021-22387" }, { "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "id": "VAR-202108-2218", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380822" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:48.781000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22387", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159050" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-913", "trust": 1.1 }, { "problemtype": "Improper control of dynamically manipulated code resources (CWE-913) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380822" }, { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "NVD", "id": "CVE-2021-22387" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22387" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/913.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380822" }, { "db": "VULMON", "id": "CVE-2021-22387" }, { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "NVD", "id": "CVE-2021-22387" }, { "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380822" }, { "db": "VULMON", "id": "CVE-2021-22387" }, { "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "db": "NVD", "id": "CVE-2021-22387" }, { "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380822" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22387" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "date": "2021-08-02T17:15:13.783000", "db": "NVD", "id": "CVE-2021-22387" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380822" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22387" }, { "date": "2022-07-11T05:42:00", "db": "JVNDB", "id": "JVNDB-2021-010879" }, { "date": "2021-12-09T17:55:11.013000", "db": "NVD", "id": "CVE-2021-22387" }, { "date": "2021-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-103" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-103" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in improper control of dynamically manipulated code resources on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010879" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-103" } ], "trust": 0.6 } }
var-202112-0327
Vulnerability from variot
There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0327", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37075" } ] }, "cve": "CVE-2021-37075", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37075", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398909", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37075", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37075", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2057", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398909", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "VULHUB", "id": "VHN-398909" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37075", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015865", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2057", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398909", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "id": "VAR-202112-0327", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398909" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.388000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Credential\u00a0management\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173804" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-522", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37075" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398909" }, { "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "db": "NVD", "id": "CVE-2021-37075" }, { "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398909" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "date": "2021-12-08T15:15:09.867000", "db": "NVD", "id": "CVE-2021-37075" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398909" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015865" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37075" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2057" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2057" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015865" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2057" } ], "trust": 0.6 } }
var-202107-1677
Vulnerability from variot
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Buffer Overflow in BootROM USB Stack. Affected devices are Huawei Mate 30 Pro (LIO), Huawei P40 Pro (ELS), Huawei P40 (ANA), Huawei Nova 5T (YAL)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1677", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22429" } ] }, "cve": "CVE-2021-22429", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22429", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380864", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22429", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22429", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2228", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380864", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Buffer Overflow in BootROM USB Stack. Affected devices are Huawei Mate 30 Pro (LIO), Huawei P40 Pro (ELS), Huawei P40 (ANA), Huawei Nova 5T (YAL)", "sources": [ { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22429", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018746", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2228", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380864", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22429", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "id": "VAR-202107-1677", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380864" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:32.961000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172015" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22429" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22429/" }, { "trust": 0.1, "url": "https://labs.taszk.io/blog/post/bootrom_usb/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380864" }, { "db": "VULMON", "id": "CVE-2021-22429" }, { "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "db": "NVD", "id": "CVE-2021-22429" }, { "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380864" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "date": "2022-02-25T19:15:09.387000", "db": "NVD", "id": "CVE-2021-22429" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380864" }, { "date": "2023-07-06T01:52:00", "db": "JVNDB", "id": "JVNDB-2021-018746" }, { "date": "2022-03-07T17:54:50.527000", "db": "NVD", "id": "CVE-2021-22429" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2228" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2228" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018746" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2228" } ], "trust": 0.6 } }
var-202207-0180
Vulnerability from variot
The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0180", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34738" } ] }, "cve": "CVE-2022-34738", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34738", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427080", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34738", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34738", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-412", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427080", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34738", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34738", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013202", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-412", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52820", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427080", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34738", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "id": "VAR-202207-0180", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427080" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:57.855000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199750" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34738" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34738/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427080" }, { "db": "VULMON", "id": "CVE-2022-34738" }, { "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "db": "NVD", "id": "CVE-2022-34738" }, { "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427080" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34738" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "date": "2022-07-12T14:15:19.377000", "db": "NVD", "id": "CVE-2022-34738" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427080" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34738" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013202" }, { "date": "2022-07-19T12:42:40.837000", "db": "NVD", "id": "CVE-2022-34738" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-412" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-412" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013202" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-412" } ], "trust": 0.6 } }
var-202208-0784
Vulnerability from variot
The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0784", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37004" } ] }, "cve": "CVE-2022-37004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37004", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37004", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2398", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "VULHUB", "id": "VHN-427495" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37004", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-014552", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2398", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427495", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427495" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "id": "VAR-202208-0784", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427495" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:23.550000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204368" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37004" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37004/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427495" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427495" }, { "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "db": "NVD", "id": "CVE-2022-37004" }, { "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427495" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "date": "2022-08-10T20:16:04.263000", "db": "NVD", "id": "CVE-2022-37004" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427495" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014552" }, { "date": "2022-08-15T18:00:46.777000", "db": "NVD", "id": "CVE-2022-37004" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2398" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2398" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014552" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2398" } ], "trust": 0.6 } }
var-202110-1487
Vulnerability from variot
There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1487", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "NVD", "id": "CVE-2021-36988" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36988" } ] }, "cve": "CVE-2021-36988", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36988", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398820", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36988", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36988", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2085", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398820", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398820" }, { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "NVD", "id": "CVE-2021-36988" }, { "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity. Huawei Smartphones have unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-36988" }, { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "VULHUB", "id": "VHN-398820" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36988", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014306", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2085", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398820", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398820" }, { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "NVD", "id": "CVE-2021-36988" }, { "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "id": "VAR-202110-1487", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398820" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:23.873000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36988", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171596" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "NVD", "id": "CVE-2021-36988" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36988" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398820" }, { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "NVD", "id": "CVE-2021-36988" }, { "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398820" }, { "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "db": "NVD", "id": "CVE-2021-36988" }, { "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398820" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "date": "2021-10-28T13:15:10.487000", "db": "NVD", "id": "CVE-2021-36988" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398820" }, { "date": "2022-10-12T08:20:00", "db": "JVNDB", "id": "JVNDB-2021-014306" }, { "date": "2021-11-01T23:14:10.413000", "db": "NVD", "id": "CVE-2021-36988" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2085" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2085" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014306" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2085" } ], "trust": 0.6 } }
var-202110-1498
Vulnerability from variot
There is an Uninitialized variable vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of invalid data. Huawei Smartphones contain a resource initialization vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1498", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "NVD", "id": "CVE-2021-22482" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22482" } ] }, "cve": "CVE-2021-22482", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22482", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380917", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22482", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22482", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2072", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380917", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22482", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380917" }, { "db": "VULMON", "id": "CVE-2021-22482" }, { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "NVD", "id": "CVE-2021-22482" }, { "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Uninitialized variable vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of invalid data. Huawei Smartphones contain a resource initialization vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-22482" }, { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "VULHUB", "id": "VHN-380917" }, { "db": "VULMON", "id": "CVE-2021-22482" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22482", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014317", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2072", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380917", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22482", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380917" }, { "db": "VULMON", "id": "CVE-2021-22482" }, { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "NVD", "id": "CVE-2021-22482" }, { "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "id": "VAR-202110-1498", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380917" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:40.282000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22482", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168213" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-909", "trust": 1.1 }, { "problemtype": "Inadequate resource initialization (CWE-909) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380917" }, { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "NVD", "id": "CVE-2021-22482" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22482" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/909.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380917" }, { "db": "VULMON", "id": "CVE-2021-22482" }, { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "NVD", "id": "CVE-2021-22482" }, { "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380917" }, { "db": "VULMON", "id": "CVE-2021-22482" }, { "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "db": "NVD", "id": "CVE-2021-22482" }, { "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380917" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22482" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "date": "2021-10-28T13:15:09.990000", "db": "NVD", "id": "CVE-2021-22482" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380917" }, { "date": "2021-11-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22482" }, { "date": "2022-10-12T08:46:00", "db": "JVNDB", "id": "JVNDB-2021-014317" }, { "date": "2021-11-02T00:13:02.573000", "db": "NVD", "id": "CVE-2021-22482" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2072" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2072" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to insufficient initialization of resources in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014317" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2072" } ], "trust": 0.6 } }
var-202106-0610
Vulnerability from variot
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0610", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22348" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22348" } ] }, "cve": "CVE-2021-22348", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380783", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22348", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22348", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-2007", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380783", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22348", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380783" }, { "db": "VULMON", "id": "CVE-2021-22348" }, { "db": "NVD", "id": "CVE-2021-22348" }, { "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22348" }, { "db": "VULHUB", "id": "VHN-380783" }, { "db": "VULMON", "id": "CVE-2021-22348" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22348", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2007", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380783", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22348", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380783" }, { "db": "VULMON", "id": "CVE-2021-22348" }, { "db": "NVD", "id": "CVE-2021-22348" }, { "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "id": "VAR-202106-0610", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380783" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:20.514000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for Huawei smartphone buffer error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156085" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380783" }, { "db": "NVD", "id": "CVE-2021-22348" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22348" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380783" }, { "db": "VULMON", "id": "CVE-2021-22348" }, { "db": "NVD", "id": "CVE-2021-22348" }, { "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380783" }, { "db": "VULMON", "id": "CVE-2021-22348" }, { "db": "NVD", "id": "CVE-2021-22348" }, { "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380783" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22348" }, { "date": "2021-06-30T21:15:09.760000", "db": "NVD", "id": "CVE-2021-22348" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380783" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22348" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22348" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2007" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2007" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2007" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2007" } ], "trust": 0.6 } }
var-202201-1719
Vulnerability from variot
There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1719", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40029" } ] }, "cve": "CVE-2021-40029", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40029", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401430", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40029", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40029", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-282", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401430", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "VULHUB", "id": "VHN-401430" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40029", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002897", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-282", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04995", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401430", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "id": "VAR-202201-1719", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401430" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:18.632000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177999" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40029" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401430" }, { "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "db": "NVD", "id": "CVE-2021-40029" }, { "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401430" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "date": "2022-01-10T14:10:21.920000", "db": "NVD", "id": "CVE-2021-40029" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401430" }, { "date": "2023-01-25T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-002897" }, { "date": "2022-01-13T14:34:52.030000", "db": "NVD", "id": "CVE-2021-40029" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-282" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-282" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002897" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-282" } ], "trust": 0.6 } }
var-202112-0134
Vulnerability from variot
There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause some services to restart. Huawei A vulnerability related to input validation exists in smartphone products.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0134", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "NVD", "id": "CVE-2021-37047" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37047" } ] }, "cve": "CVE-2021-37047", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37047", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398880", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37047", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37047", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-462", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398880", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398880" }, { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "NVD", "id": "CVE-2021-37047" }, { "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause some services to restart. Huawei A vulnerability related to input validation exists in smartphone products.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37047" }, { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "VULHUB", "id": "VHN-398880" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37047", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015792", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-462", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398880", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398880" }, { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "NVD", "id": "CVE-2021-37047" }, { "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "id": "VAR-202112-0134", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398880" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:58.717000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173134" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398880" }, { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "NVD", "id": "CVE-2021-37047" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37047" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398880" }, { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "NVD", "id": "CVE-2021-37047" }, { "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398880" }, { "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "db": "NVD", "id": "CVE-2021-37047" }, { "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398880" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "date": "2021-12-07T16:15:07.537000", "db": "NVD", "id": "CVE-2021-37047" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398880" }, { "date": "2022-11-30T04:53:00", "db": "JVNDB", "id": "JVNDB-2021-015792" }, { "date": "2021-12-07T19:48:42.293000", "db": "NVD", "id": "CVE-2021-37047" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-462" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-462" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015792" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-462" } ], "trust": 0.6 } }
var-202208-0507
Vulnerability from variot
The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an inadequate validation of data reliability vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0507", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37008" } ] }, "cve": "CVE-2022-37008", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37008", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37008", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2400", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an inadequate validation of data reliability vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "VULHUB", "id": "VHN-427493" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37008", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-014548", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2400", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427493", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "id": "VAR-202208-0507", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427493" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:24.099000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204370" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-345", "trust": 1.1 }, { "problemtype": "Inadequate verification of data reliability (CWE-345) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37008" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37008/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427493" }, { "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "db": "NVD", "id": "CVE-2022-37008" }, { "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427493" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "date": "2022-08-10T20:16:04.967000", "db": "NVD", "id": "CVE-2022-37008" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427493" }, { "date": "2023-09-20T08:28:00", "db": "JVNDB", "id": "JVNDB-2022-014548" }, { "date": "2022-08-15T17:58:26.997000", "db": "NVD", "id": "CVE-2022-37008" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2400" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2400" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Insufficient Validation of Data Trust in Products Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014548" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2400" } ], "trust": 0.6 } }
var-202108-2217
Vulnerability from variot
There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2217", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "NVD", "id": "CVE-2021-22391" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22391" } ] }, "cve": "CVE-2021-22391", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22391", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380826", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22391", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22391", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-111", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380826", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22391", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380826" }, { "db": "VULMON", "id": "CVE-2021-22391" }, { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "NVD", "id": "CVE-2021-22391" }, { "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset", "sources": [ { "db": "NVD", "id": "CVE-2021-22391" }, { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "VULHUB", "id": "VHN-380826" }, { "db": "VULMON", "id": "CVE-2021-22391" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22391", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010872", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-111", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380826", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22391", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380826" }, { "db": "VULMON", "id": "CVE-2021-22391" }, { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "NVD", "id": "CVE-2021-22391" }, { "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "id": "VAR-202108-2217", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380826" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:19.223000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22391", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159053" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 }, { "problemtype": "Buffer size calculation error (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380826" }, { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "NVD", "id": "CVE-2021-22391" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22391" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/131.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380826" }, { "db": "VULMON", "id": "CVE-2021-22391" }, { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "NVD", "id": "CVE-2021-22391" }, { "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380826" }, { "db": "VULMON", "id": "CVE-2021-22391" }, { "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "db": "NVD", "id": "CVE-2021-22391" }, { "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380826" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22391" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "date": "2021-08-02T17:15:13.983000", "db": "NVD", "id": "CVE-2021-22391" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380826" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22391" }, { "date": "2022-07-11T05:34:00", "db": "JVNDB", "id": "JVNDB-2021-010872" }, { "date": "2021-12-09T17:55:11.020000", "db": "NVD", "id": "CVE-2021-22391" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-111" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-111" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability regarding buffer size calculation error in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010872" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-111" } ], "trust": 0.6 } }
var-202110-1851
Vulnerability from variot
There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1851", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37110" } ] }, "cve": "CVE-2021-37110", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37110", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398946", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37110", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37110", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2230", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398946", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Timing design defects in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37110", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017380", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2230", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398946", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37110", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "id": "VAR-202110-1851", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398946" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:00.373000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176778" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37110" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398946" }, { "db": "VULMON", "id": "CVE-2021-37110" }, { "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "db": "NVD", "id": "CVE-2021-37110" }, { "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398946" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37110" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "date": "2022-01-03T22:15:09", "db": "NVD", "id": "CVE-2021-37110" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398946" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37110" }, { "date": "2023-01-17T07:06:00", "db": "JVNDB", "id": "JVNDB-2021-017380" }, { "date": "2022-01-11T19:27:32.067000", "db": "NVD", "id": "CVE-2021-37110" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2230" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2230" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017380" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2230" } ], "trust": 0.6 } }
var-202110-1500
Vulnerability from variot
There is an Improper permission management vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones are vulnerable to improper default permissions.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1500", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "NVD", "id": "CVE-2021-22475" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22475" } ] }, "cve": "CVE-2021-22475", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22475", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380910", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22475", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22475", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2069", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380910", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380910" }, { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "NVD", "id": "CVE-2021-22475" }, { "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper permission management vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones are vulnerable to improper default permissions.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22475" }, { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "VULHUB", "id": "VHN-380910" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22475", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014319", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2069", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380910", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380910" }, { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "NVD", "id": "CVE-2021-22475" }, { "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "id": "VAR-202110-1500", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380910" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:00.477000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22475", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168211" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380910" }, { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "NVD", "id": "CVE-2021-22475" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22475" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380910" }, { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "NVD", "id": "CVE-2021-22475" }, { "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380910" }, { "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "db": "NVD", "id": "CVE-2021-22475" }, { "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380910" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "date": "2021-10-28T13:15:09.873000", "db": "NVD", "id": "CVE-2021-22475" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380910" }, { "date": "2022-10-12T08:48:00", "db": "JVNDB", "id": "JVNDB-2021-014319" }, { "date": "2021-11-02T00:13:45.947000", "db": "NVD", "id": "CVE-2021-22475" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2069" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2069" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Improper Default Permission Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014319" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2069" } ], "trust": 0.6 } }
var-202204-1291
Vulnerability from variot
A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a fraudulent authentication vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. An attacker could exploit this vulnerability to cause unauthorized access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1291", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22254" } ] }, "cve": "CVE-2022-22254", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-22254", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-409783", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22254", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22254", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2034", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409783", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22254", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a fraudulent authentication vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has an authorization issue vulnerability. This vulnerability stems from the lack of authentication measures or insufficient authentication strength in network systems or products. An attacker could exploit this vulnerability to cause unauthorized access", "sources": [ { "db": "NVD", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22254", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-008144", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2034", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44622", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409783", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22254", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "id": "VAR-202204-1291", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409783" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:57:52.130000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=190070" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Illegal authentication (CWE-863) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22254" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22254/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409783" }, { "db": "VULMON", "id": "CVE-2022-22254" }, { "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "db": "NVD", "id": "CVE-2022-22254" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409783" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22254" }, { "date": "2023-07-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "date": "2022-04-11T20:15:19.567000", "db": "NVD", "id": "CVE-2022-22254" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-19T00:00:00", "db": "VULHUB", "id": "VHN-409783" }, { "date": "2023-08-08T00:00:00", "db": "VULMON", "id": "CVE-2022-22254" }, { "date": "2023-07-24T08:23:00", "db": "JVNDB", "id": "JVNDB-2022-008144" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2034" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-22254" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2034" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Fraudulent Authentication Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008144" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2034" } ], "trust": 0.6 } }
var-202106-0608
Vulnerability from variot
There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds memory write. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0608", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22345" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22345" } ] }, "cve": "CVE-2021-22345", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380780", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22345", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22345", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-2012", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380780", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22345", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380780" }, { "db": "VULMON", "id": "CVE-2021-22345" }, { "db": "NVD", "id": "CVE-2021-22345" }, { "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input Verification Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds memory write. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22345" }, { "db": "VULHUB", "id": "VHN-380780" }, { "db": "VULMON", "id": "CVE-2021-22345" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22345", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2012", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380780", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22345", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380780" }, { "db": "VULMON", "id": "CVE-2021-22345" }, { "db": "NVD", "id": "CVE-2021-22345" }, { "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "id": "VAR-202106-0608", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380780" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:50.613000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for Huawei smartphone input verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156090" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380780" }, { "db": "NVD", "id": "CVE-2021-22345" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22345" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380780" }, { "db": "VULMON", "id": "CVE-2021-22345" }, { "db": "NVD", "id": "CVE-2021-22345" }, { "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380780" }, { "db": "VULMON", "id": "CVE-2021-22345" }, { "db": "NVD", "id": "CVE-2021-22345" }, { "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380780" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22345" }, { "date": "2021-06-30T22:15:08.123000", "db": "NVD", "id": "CVE-2021-22345" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380780" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22345" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22345" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2012" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2012" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone input verification error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2012" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2012" } ], "trust": 0.6 } }
var-202206-0119
Vulnerability from variot
The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0119", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31756" } ] }, "cve": "CVE-2022-31756", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31756", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-423589", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31756", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31756", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-476", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423589", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31756", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31756", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011280", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-476", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66180", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423589", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31756", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "id": "VAR-202206-0119", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423589" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:39.501000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=195991" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31756" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31756/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423589" }, { "db": "VULMON", "id": "CVE-2022-31756" }, { "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "db": "NVD", "id": "CVE-2022-31756" }, { "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423589" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31756" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "date": "2022-06-13T15:15:10.150000", "db": "NVD", "id": "CVE-2022-31756" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423589" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2022-31756" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011280" }, { "date": "2022-06-18T03:07:52.780000", "db": "NVD", "id": "CVE-2022-31756" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-476" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-476" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011280" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-476" } ], "trust": 0.6 } }
var-202203-0269
Vulnerability from variot
There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0269", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40063" } ] }, "cve": "CVE-2021-40063", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40063", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401464", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40063", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40063", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-972", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401464", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "VULHUB", "id": "VHN-401464" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40063", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018701", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-972", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401464", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "id": "VAR-202203-0269", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401464" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:13.670000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185886" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40063" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40063/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401464" }, { "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "db": "NVD", "id": "CVE-2021-40063" }, { "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401464" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "date": "2022-03-10T17:43:24.527000", "db": "NVD", "id": "CVE-2021-40063" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401464" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018701" }, { "date": "2022-03-14T16:17:53.347000", "db": "NVD", "id": "CVE-2021-40063" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-972" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-972" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018701" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-972" } ], "trust": 0.6 } }
var-202111-1768
Vulnerability from variot
There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down. plural Huawei For smartphone products, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1768", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39973" } ] }, "cve": "CVE-2021-39973", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39973", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401374", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-39973", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39973", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2132", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401374", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down. plural Huawei For smartphone products, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39973", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017607", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2132", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401374", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39973", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "id": "VAR-202111-1768", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401374" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:39.766000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176793" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39973" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401374" }, { "db": "VULMON", "id": "CVE-2021-39973" }, { "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "db": "NVD", "id": "CVE-2021-39973" }, { "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401374" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39973" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "date": "2022-01-03T22:15:10.283000", "db": "NVD", "id": "CVE-2021-39973" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401374" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39973" }, { "date": "2023-01-27T06:59:00", "db": "JVNDB", "id": "JVNDB-2021-017607" }, { "date": "2022-01-13T15:52:06.580000", "db": "NVD", "id": "CVE-2021-39973" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2132" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2132" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 in smartphone products \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017607" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2132" } ], "trust": 0.6 } }
var-202208-0562
Vulnerability from variot
The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0562", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37007" } ] }, "cve": "CVE-2022-37007", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-37007", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37007", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2402", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "VULHUB", "id": "VHN-427491" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37007", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-014549", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2402", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427491", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "id": "VAR-202208-0562", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427491" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:45.959000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204372" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37007" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37007/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427491" }, { "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "db": "NVD", "id": "CVE-2022-37007" }, { "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427491" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "date": "2022-08-10T20:16:04.797000", "db": "NVD", "id": "CVE-2022-37007" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427491" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014549" }, { "date": "2022-08-15T17:59:09.927000", "db": "NVD", "id": "CVE-2022-37007" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2402" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2402" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014549" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2402" } ], "trust": 0.6 } }
var-202110-1848
Vulnerability from variot
There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Some Huawei smart screens in Huawei HarmonyOS Vision have security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1848", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37117" } ] }, "cve": "CVE-2021-37117", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37117", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398953", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37117", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37117", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2233", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398953", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Some Huawei smart screens in Huawei HarmonyOS Vision have security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37117", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017311", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2233", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-04710", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398953", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37117", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "id": "VAR-202110-1848", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398953" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:23.733000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Service\u00a0logic\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176781" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37117" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398953" }, { "db": "VULMON", "id": "CVE-2021-37117" }, { "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "db": "NVD", "id": "CVE-2021-37117" }, { "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398953" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37117" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "date": "2022-01-03T22:15:09.347000", "db": "NVD", "id": "CVE-2021-37117" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398953" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37117" }, { "date": "2023-01-13T06:27:00", "db": "JVNDB", "id": "JVNDB-2021-017311" }, { "date": "2022-01-11T19:46:26.163000", "db": "NVD", "id": "CVE-2021-37117" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2233" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2233" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017311" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2233" } ], "trust": 0.6 } }
var-202111-1592
Vulnerability from variot
There is an Improper permission vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones are vulnerable to improper default permissions.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. An incorrect permission vulnerability exists in Huawei Emui and Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1592", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "NVD", "id": "CVE-2021-37030" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37030" } ] }, "cve": "CVE-2021-37030", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37030", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398863", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37030", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37030", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1895", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398863", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398863" }, { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "NVD", "id": "CVE-2021-37030" }, { "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper permission vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones are vulnerable to improper default permissions.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. An incorrect permission vulnerability exists in Huawei Emui and Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-37030" }, { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "VULHUB", "id": "VHN-398863" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37030", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015558", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1895", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102863", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398863" }, { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "NVD", "id": "CVE-2021-37030" }, { "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "id": "VAR-202111-1592", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398863" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:47.626000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172192" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398863" }, { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "NVD", "id": "CVE-2021-37030" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37030" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398863" }, { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "NVD", "id": "CVE-2021-37030" }, { "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398863" }, { "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "db": "NVD", "id": "CVE-2021-37030" }, { "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398863" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "date": "2021-11-23T16:15:09.707000", "db": "NVD", "id": "CVE-2021-37030" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398863" }, { "date": "2022-11-24T06:42:00", "db": "JVNDB", "id": "JVNDB-2021-015558" }, { "date": "2021-12-09T17:57:50.007000", "db": "NVD", "id": "CVE-2021-37030" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1895" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1895" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Improper Default Permission Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015558" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1895" } ], "trust": 0.6 } }
var-202112-0238
Vulnerability from variot
There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart. plural Huawei A code injection vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0238", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37097" } ] }, "cve": "CVE-2021-37097", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37097", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398933", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37097", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37097", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2062", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398933", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart. plural Huawei A code injection vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "VULHUB", "id": "VHN-398933" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37097", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015868", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2062", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398933", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "id": "VAR-202112-0238", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398933" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:21.834000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "OOM\u00a0vulnerability\u00a0with\u00a0the\u00a0system\u00a0framework\u00a0code\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for code injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173805" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37097" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398933" }, { "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "db": "NVD", "id": "CVE-2021-37097" }, { "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398933" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "date": "2021-12-08T15:15:10.023000", "db": "NVD", "id": "CVE-2021-37097" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-15T00:00:00", "db": "VULHUB", "id": "VHN-398933" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015868" }, { "date": "2021-12-15T13:47:44.103000", "db": "NVD", "id": "CVE-2021-37097" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2062" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2062" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Code injection vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015868" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2062" } ], "trust": 0.6 } }
var-202112-0353
Vulnerability from variot
There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. plural Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0353", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37044" } ] }, "cve": "CVE-2021-37044", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37044", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398877", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37044", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37044", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2048", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398877", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. plural Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "VULHUB", "id": "VHN-398877" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37044", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015892", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2048", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398877", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "id": "VAR-202112-0353", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398877" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:39.522000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Permission\u00a0control\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173801" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37044" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398877" }, { "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "db": "NVD", "id": "CVE-2021-37044" }, { "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398877" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "date": "2021-12-08T15:15:09.323000", "db": "NVD", "id": "CVE-2021-37044" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398877" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015892" }, { "date": "2021-12-09T17:56:42.897000", "db": "NVD", "id": "CVE-2021-37044" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2048" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2048" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to improper retention of permissions in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015892" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2048" } ], "trust": 0.6 } }
var-202112-0343
Vulnerability from variot
There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei An incomplete cleanup vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. HUAWEI HarmonyOS has a resource management error vulnerability. This vulnerability is caused by a resource not closing or releasing vulnerability in a certain component of HarmonyOS. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0343", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37092" } ] }, "cve": "CVE-2021-37092", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37092", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398928", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37092", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37092", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2038", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398928", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei An incomplete cleanup vulnerability exists in smartphone products.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. HUAWEI HarmonyOS has a resource management error vulnerability. This vulnerability is caused by a resource not closing or releasing vulnerability in a certain component of HarmonyOS. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "VULHUB", "id": "VHN-398928" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37092", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015866", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2038", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08328", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398928", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "id": "VAR-202112-0343", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398928" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:05.189000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Memory\u00a0leakage\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173795" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 }, { "problemtype": "incomplete cleanup (CWE-459) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37092" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398928" }, { "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "db": "NVD", "id": "CVE-2021-37092" }, { "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398928" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "date": "2021-12-08T15:15:09.920000", "db": "NVD", "id": "CVE-2021-37092" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398928" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015866" }, { "date": "2021-12-09T17:59:00.210000", "db": "NVD", "id": "CVE-2021-37092" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2038" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2038" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Incomplete Cleanup Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015866" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2038" } ], "trust": 0.6 } }
var-202110-1489
Vulnerability from variot
There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1489", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "NVD", "id": "CVE-2021-36986" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36986" } ] }, "cve": "CVE-2021-36986", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36986", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398818", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-36986", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36986", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2083", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398818", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398818" }, { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "NVD", "id": "CVE-2021-36986" }, { "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36986" }, { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "VULHUB", "id": "VHN-398818" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36986", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014308", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2083", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398818", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398818" }, { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "NVD", "id": "CVE-2021-36986" }, { "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "id": "VAR-202110-1489", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398818" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:41.878000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36986", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171589" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398818" }, { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "NVD", "id": "CVE-2021-36986" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36986" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398818" }, { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "NVD", "id": "CVE-2021-36986" }, { "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398818" }, { "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "db": "NVD", "id": "CVE-2021-36986" }, { "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398818" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "date": "2021-10-28T13:15:10.400000", "db": "NVD", "id": "CVE-2021-36986" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398818" }, { "date": "2022-10-12T08:23:00", "db": "JVNDB", "id": "JVNDB-2021-014308" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-36986" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2083" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2083" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014308" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2083" } ], "trust": 0.6 } }
var-202110-1496
Vulnerability from variot
There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality. Huawei There is an unspecified vulnerability in the device.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1496", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "NVD", "id": "CVE-2021-22485" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22485" } ] }, "cve": "CVE-2021-22485", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22485", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380920", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22485", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22485", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2075", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380920", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380920" }, { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "NVD", "id": "CVE-2021-22485" }, { "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality. Huawei There is an unspecified vulnerability in the device.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22485" }, { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "VULHUB", "id": "VHN-380920" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22485", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014315", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2075", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380920", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380920" }, { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "NVD", "id": "CVE-2021-22485" }, { "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "id": "VAR-202110-1496", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380920" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:07.276000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22485", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171571" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "NVD", "id": "CVE-2021-22485" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22485" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380920" }, { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "NVD", "id": "CVE-2021-22485" }, { "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380920" }, { "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "db": "NVD", "id": "CVE-2021-22485" }, { "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380920" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "date": "2021-10-28T13:15:10.103000", "db": "NVD", "id": "CVE-2021-22485" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380920" }, { "date": "2022-10-12T08:43:00", "db": "JVNDB", "id": "JVNDB-2021-014315" }, { "date": "2021-11-01T23:54:36.053000", "db": "NVD", "id": "CVE-2021-22485" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2075" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2075" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in devices", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014315" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2075" } ], "trust": 0.6 } }
var-202106-1930
Vulnerability from variot
There is a Business Logic Errors vulnerability in Huawei Smartphone. The malicious apps installed on the device can keep taking screenshots in the background. This issue does not cause system errors, but may cause personal information leakage. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1930", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "NVD", "id": "CVE-2021-22308" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22308" } ] }, "cve": "CVE-2021-22308", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22308", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380743", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "baseSeverity": "Low", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22308", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22308", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202106-230", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-380743", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380743" }, { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "NVD", "id": "CVE-2021-22308" }, { "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Business Logic Errors vulnerability in Huawei Smartphone. The malicious apps installed on the device can keep taking screenshots in the background. This issue does not cause system errors, but may cause personal information leakage. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22308" }, { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "VULHUB", "id": "VHN-380743" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22308", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007562", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-230", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380743", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380743" }, { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "NVD", "id": "CVE-2021-22308" }, { "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "id": "VAR-202106-1930", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380743" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:31.146000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "title": "Repair measures for vulnerabilities in processing logic errors in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153892" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "NVD", "id": "CVE-2021-22308" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22308" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380743" }, { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "NVD", "id": "CVE-2021-22308" }, { "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380743" }, { "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "db": "NVD", "id": "CVE-2021-22308" }, { "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380743" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "date": "2021-06-03T16:15:10.753000", "db": "NVD", "id": "CVE-2021-22308" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380743" }, { "date": "2022-02-17T05:09:00", "db": "JVNDB", "id": "JVNDB-2021-007562" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22308" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-230" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-230" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007562" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-230" } ], "trust": 0.6 } }
var-202107-1678
Vulnerability from variot
There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1678", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22432" } ] }, "cve": "CVE-2021-22432", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22432", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380867", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22432", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22432", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2227", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380867", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22432", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22432", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018743", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2227", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380867", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22432", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "id": "VAR-202107-1678", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380867" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T23:03:43.314000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172010" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22432" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22432/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380867" }, { "db": "VULMON", "id": "CVE-2021-22432" }, { "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "db": "NVD", "id": "CVE-2021-22432" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380867" }, { "date": "2022-02-25T00:00:00", "db": "VULMON", "id": "CVE-2021-22432" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "date": "2022-02-25T19:15:10.007000", "db": "NVD", "id": "CVE-2021-22432" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380867" }, { "date": "2022-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22432" }, { "date": "2023-07-06T01:42:00", "db": "JVNDB", "id": "JVNDB-2021-018743" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2227" }, { "date": "2022-03-07T17:58:26.287000", "db": "NVD", "id": "CVE-2021-22432" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2227" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018743" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2227" } ], "trust": 0.6 } }
var-202107-1683
Vulnerability from variot
There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1683", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22434" } ] }, "cve": "CVE-2021-22434", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22434", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380869", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22434", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22434", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2222", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380869", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22434", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22434", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018741", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2222", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380869", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22434", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "id": "VAR-202107-1683", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380869" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T22:56:28.352000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171984" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22434" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22434/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380869" }, { "db": "VULMON", "id": "CVE-2021-22434" }, { "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "db": "NVD", "id": "CVE-2021-22434" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380869" }, { "date": "2022-02-25T00:00:00", "db": "VULMON", "id": "CVE-2021-22434" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "date": "2022-02-25T19:15:10.317000", "db": "NVD", "id": "CVE-2021-22434" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380869" }, { "date": "2022-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22434" }, { "date": "2023-07-06T01:37:00", "db": "JVNDB", "id": "JVNDB-2021-018741" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2222" }, { "date": "2022-03-07T18:46:17.363000", "db": "NVD", "id": "CVE-2021-22434" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2222" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018741" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2222" } ], "trust": 0.6 } }
var-202112-0347
Vulnerability from variot
There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0347", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37053" } ] }, "cve": "CVE-2021-37053", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37053", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398886", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37053", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37053", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2046", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398886", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "VULHUB", "id": "VHN-398886" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37053", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015861", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2046", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398886", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "id": "VAR-202112-0347", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398886" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:41.228000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Service\u00a0logic\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures to handle logic errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173799" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37053" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398886" }, { "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "db": "NVD", "id": "CVE-2021-37053" }, { "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398886" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "date": "2021-12-08T15:15:09.647000", "db": "NVD", "id": "CVE-2021-37053" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398886" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015861" }, { "date": "2021-12-09T17:55:28.810000", "db": "NVD", "id": "CVE-2021-37053" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2046" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2046" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015861" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "handling logic errors", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2046" } ], "trust": 0.6 } }
var-202110-1443
Vulnerability from variot
There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1443", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "NVD", "id": "CVE-2021-22407" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22407" } ] }, "cve": "CVE-2021-22407", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22407", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380842", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22407", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22407", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2038", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380842", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380842" }, { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "NVD", "id": "CVE-2021-22407" }, { "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22407" }, { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "VULHUB", "id": "VHN-380842" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22407", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014284", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2038", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380842", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380842" }, { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "NVD", "id": "CVE-2021-22407" }, { "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "id": "VAR-202110-1443", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380842" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:23Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Fixes for configuration error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168194" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "NVD", "id": "CVE-2021-22407" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22407" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380842" }, { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "NVD", "id": "CVE-2021-22407" }, { "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380842" }, { "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "db": "NVD", "id": "CVE-2021-22407" }, { "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380842" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "date": "2021-10-28T13:15:08.730000", "db": "NVD", "id": "CVE-2021-22407" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380842" }, { "date": "2022-10-12T02:04:00", "db": "JVNDB", "id": "JVNDB-2021-014284" }, { "date": "2021-11-01T19:41:11.663000", "db": "NVD", "id": "CVE-2021-22407" }, { "date": "2021-11-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2038" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2038" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014284" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "configuration error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2038" } ], "trust": 0.6 } }
var-202106-0593
Vulnerability from variot
There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0593", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22369" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22369" } ] }, "cve": "CVE-2021-22369", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-380804", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2021-22369", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22369", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1990", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380804", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22369", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380804" }, { "db": "VULMON", "id": "CVE-2021-22369" }, { "db": "NVD", "id": "CVE-2021-22369" }, { "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws", "sources": [ { "db": "NVD", "id": "CVE-2021-22369" }, { "db": "VULHUB", "id": "VHN-380804" }, { "db": "VULMON", "id": "CVE-2021-22369" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22369", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1990", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380804", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22369", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380804" }, { "db": "VULMON", "id": "CVE-2021-22369" }, { "db": "NVD", "id": "CVE-2021-22369" }, { "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "id": "VAR-202106-0593", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380804" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:32.707000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156073" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-367", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380804" }, { "db": "NVD", "id": "CVE-2021-22369" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22369" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/367.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380804" }, { "db": "VULMON", "id": "CVE-2021-22369" }, { "db": "NVD", "id": "CVE-2021-22369" }, { "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380804" }, { "db": "VULMON", "id": "CVE-2021-22369" }, { "db": "NVD", "id": "CVE-2021-22369" }, { "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380804" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22369" }, { "date": "2021-06-30T15:15:10.380000", "db": "NVD", "id": "CVE-2021-22369" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380804" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22369" }, { "date": "2021-07-06T14:58:00.257000", "db": "NVD", "id": "CVE-2021-22369" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1990" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1990" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1990" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1990" } ], "trust": 0.6 } }
var-202106-0609
Vulnerability from variot
There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to the disclosure of user habits. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There are security vulnerabilities in several Huawei SmartPhone, which stems from the lack of effective permissions and access control measures in the products. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0609", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22346" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22346" } ] }, "cve": "CVE-2021-22346", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380781", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22346", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22346", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-2006", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380781", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22346", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380781" }, { "db": "VULMON", "id": "CVE-2021-22346" }, { "db": "NVD", "id": "CVE-2021-22346" }, { "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to the disclosure of user habits. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There are security vulnerabilities in several Huawei SmartPhone, which stems from the lack of effective permissions and access control measures in the products. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22346" }, { "db": "VULHUB", "id": "VHN-380781" }, { "db": "VULMON", "id": "CVE-2021-22346" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22346", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2006", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380781", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22346", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380781" }, { "db": "VULMON", "id": "CVE-2021-22346" }, { "db": "NVD", "id": "CVE-2021-22346" }, { "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "id": "VAR-202106-0609", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380781" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:11.559000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156084" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380781" }, { "db": "NVD", "id": "CVE-2021-22346" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22346" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380781" }, { "db": "VULMON", "id": "CVE-2021-22346" }, { "db": "NVD", "id": "CVE-2021-22346" }, { "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380781" }, { "db": "VULMON", "id": "CVE-2021-22346" }, { "db": "NVD", "id": "CVE-2021-22346" }, { "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380781" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22346" }, { "date": "2021-06-30T21:15:09.717000", "db": "NVD", "id": "CVE-2021-22346" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380781" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22346" }, { "date": "2021-07-06T18:09:38.953000", "db": "NVD", "id": "CVE-2021-22346" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2006" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2006" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2006" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2006" } ], "trust": 0.6 } }
var-202108-2286
Vulnerability from variot
There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration. EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2286", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22394" } ] }, "cve": "CVE-2021-22394", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22394", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380829", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22394", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22394", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-2828", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380829", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration. EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "VULHUB", "id": "VHN-380829" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22394", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018587", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2828", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380829", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "id": "VAR-202108-2286", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380829" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:25.437000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202108-0000001181125881 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172031" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22394" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22394/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380829" }, { "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "db": "NVD", "id": "CVE-2021-22394" }, { "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380829" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "date": "2022-02-25T19:15:08.927000", "db": "NVD", "id": "CVE-2021-22394" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380829" }, { "date": "2023-06-30T08:30:00", "db": "JVNDB", "id": "JVNDB-2021-018587" }, { "date": "2022-03-07T17:39:01.157000", "db": "NVD", "id": "CVE-2021-22394" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2828" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2828" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018587" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2828" } ], "trust": 0.6 } }
var-202110-1491
Vulnerability from variot
There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1491", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "NVD", "id": "CVE-2021-22491" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22491" } ] }, "cve": "CVE-2021-22491", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22491", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380926", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22491", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22491", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2081", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380926", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380926" }, { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "NVD", "id": "CVE-2021-22491" }, { "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones contain a vulnerability related to input validation.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22491" }, { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "VULHUB", "id": "VHN-380926" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22491", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014310", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2081", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380926", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380926" }, { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "NVD", "id": "CVE-2021-22491" }, { "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "id": "VAR-202110-1491", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380926" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:42.920000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22491", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168220" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380926" }, { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "NVD", "id": "CVE-2021-22491" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22491" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380926" }, { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "NVD", "id": "CVE-2021-22491" }, { "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380926" }, { "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "db": "NVD", "id": "CVE-2021-22491" }, { "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380926" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "date": "2021-10-28T13:15:10.307000", "db": "NVD", "id": "CVE-2021-22491" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380926" }, { "date": "2022-10-12T08:30:00", "db": "JVNDB", "id": "JVNDB-2021-014310" }, { "date": "2021-11-01T23:25:32.877000", "db": "NVD", "id": "CVE-2021-22491" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2081" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2081" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014310" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2081" } ], "trust": 0.6 } }
var-202101-0998
Vulnerability from variot
There is a heap-based buffer overflow vulnerability in some Huawei Smartphone, Successful exploit of this vulnerability can cause process exceptions during updating. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-0998", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "NVD", "id": "CVE-2020-9138" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9138" } ] }, "cve": "CVE-2020-9138", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9138", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-187263", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9138", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9138", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202101-1043", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-187263", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187263" }, { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "NVD", "id": "CVE-2020-9138" }, { "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap-based buffer overflow vulnerability in some Huawei Smartphone, Successful exploit of this vulnerability can cause process exceptions during updating. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company", "sources": [ { "db": "NVD", "id": "CVE-2020-9138" }, { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "VULHUB", "id": "VHN-187263" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9138", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015440", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1043", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187263", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187263" }, { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "NVD", "id": "CVE-2020-9138" }, { "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "id": "VAR-202101-0998", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187263" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:56:01.694000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Repair measures for Huawei smartphone buffer error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139432" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187263" }, { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "NVD", "id": "CVE-2020-9138" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9138" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187263" }, { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "NVD", "id": "CVE-2020-9138" }, { "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187263" }, { "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "db": "NVD", "id": "CVE-2020-9138" }, { "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187263" }, { "date": "2021-09-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "date": "2021-01-13T22:15:13.880000", "db": "NVD", "id": "CVE-2020-9138" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-19T00:00:00", "db": "VULHUB", "id": "VHN-187263" }, { "date": "2021-09-22T09:11:00", "db": "JVNDB", "id": "JVNDB-2020-015440" }, { "date": "2021-01-19T15:03:46.657000", "db": "NVD", "id": "CVE-2020-9138" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1043" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1043" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability regarding out-of-bounds writing on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015440" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1043" } ], "trust": 0.6 } }
var-202111-1766
Vulnerability from variot
There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource initialization vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1766", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39966" } ] }, "cve": "CVE-2021-39966", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39966", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401367", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39966", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39966", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2134", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401367", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource initialization vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39966", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017615", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2134", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-14783", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401367", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39966", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "id": "VAR-202111-1766", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401367" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:25.235000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176795" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-909", "trust": 1.1 }, { "problemtype": "Inadequate resource initialization (CWE-909) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39966" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401367" }, { "db": "VULMON", "id": "CVE-2021-39966" }, { "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "db": "NVD", "id": "CVE-2021-39966" }, { "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401367" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39966" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "date": "2022-01-03T22:15:09.957000", "db": "NVD", "id": "CVE-2021-39966" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401367" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39966" }, { "date": "2023-01-27T07:28:00", "db": "JVNDB", "id": "JVNDB-2021-017615" }, { "date": "2022-01-13T16:22:11.833000", "db": "NVD", "id": "CVE-2021-39966" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2134" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2134" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to insufficient initialization of resources in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017615" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2134" } ], "trust": 0.6 } }
var-202108-2196
Vulnerability from variot
There is an Integer Underflow (Wrap or Wraparound) Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS of Samgr
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2196", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "NVD", "id": "CVE-2021-22379" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22379" } ] }, "cve": "CVE-2021-22379", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22379", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380814", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22379", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22379", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-097", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380814", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22379", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380814" }, { "db": "VULMON", "id": "CVE-2021-22379" }, { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "NVD", "id": "CVE-2021-22379" }, { "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Integer Underflow (Wrap or Wraparound) Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS of Samgr", "sources": [ { "db": "NVD", "id": "CVE-2021-22379" }, { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "VULHUB", "id": "VHN-380814" }, { "db": "VULMON", "id": "CVE-2021-22379" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22379", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010876", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-097", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380814", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22379", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380814" }, { "db": "VULMON", "id": "CVE-2021-22379" }, { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "NVD", "id": "CVE-2021-22379" }, { "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "id": "VAR-202108-2196", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380814" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:19.249000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22379", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Fixes for digital error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159074" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-191", "trust": 1.1 }, { "problemtype": "Integer underflow (CWE-191) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380814" }, { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "NVD", "id": "CVE-2021-22379" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22379" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/191.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380814" }, { "db": "VULMON", "id": "CVE-2021-22379" }, { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "NVD", "id": "CVE-2021-22379" }, { "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380814" }, { "db": "VULMON", "id": "CVE-2021-22379" }, { "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "db": "NVD", "id": "CVE-2021-22379" }, { "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380814" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22379" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "date": "2021-08-02T17:15:13.617000", "db": "NVD", "id": "CVE-2021-22379" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380814" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22379" }, { "date": "2022-07-11T05:42:00", "db": "JVNDB", "id": "JVNDB-2021-010876" }, { "date": "2021-12-09T17:55:10.127000", "db": "NVD", "id": "CVE-2021-22379" }, { "date": "2021-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-097" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-097" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 smartphone \u00a0 Integer underflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010876" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-097" } ], "trust": 0.6 } }
var-202110-1856
Vulnerability from variot
There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion. Huawei Smartphone products are vulnerable to resource allocation without limits or throttling.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1856", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37111" } ] }, "cve": "CVE-2021-37111", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37111", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398947", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37111", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37111", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2225", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398947", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion. Huawei Smartphone products are vulnerable to resource allocation without limits or throttling.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37111", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017379", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2225", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398947", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37111", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "id": "VAR-202110-1856", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398947" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:18.682000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176773" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-770", "trust": 1.1 }, { "problemtype": "Allocation of resources without limits or throttling (CWE-770) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37111" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398947" }, { "db": "VULMON", "id": "CVE-2021-37111" }, { "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "db": "NVD", "id": "CVE-2021-37111" }, { "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398947" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37111" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "date": "2022-01-03T22:15:09.057000", "db": "NVD", "id": "CVE-2021-37111" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398947" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37111" }, { "date": "2023-01-17T07:04:00", "db": "JVNDB", "id": "JVNDB-2021-017379" }, { "date": "2022-01-11T19:31:32.390000", "db": "NVD", "id": "CVE-2021-37111" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2225" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2225" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in resource allocation without limits or throttling in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017379" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2225" } ], "trust": 0.6 } }
var-202112-0342
Vulnerability from variot
There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability is caused by a component of the product that does not effectively authenticate user identities. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0342", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37093" } ] }, "cve": "CVE-2021-37093", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37093", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398929", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37093", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37093", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-2028", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398929", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages. plural Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The vulnerability is caused by a component of the product that does not effectively authenticate user identities. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "VULHUB", "id": "VHN-398929" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37093", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015867", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2028", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08327", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398929", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "id": "VAR-202112-0342", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398929" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:21.280000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Improper\u00a0access\u00a0control\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173791" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37093" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398929" }, { "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "db": "NVD", "id": "CVE-2021-37093" }, { "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398929" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "date": "2021-12-08T15:15:09.973000", "db": "NVD", "id": "CVE-2021-37093" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398929" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015867" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37093" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2028" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2028" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015867" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2028" } ], "trust": 0.6 } }
var-202209-0585
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0585", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38997" } ] }, "cve": "CVE-2022-38997", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38997", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38997", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-173", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "VULHUB", "id": "VHN-434768" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38997", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016782", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-173", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434768", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434768" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "id": "VAR-202209-0585", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434768" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:39.410000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208081" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38997" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38997/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434768" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434768" }, { "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "db": "NVD", "id": "CVE-2022-38997" }, { "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434768" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "date": "2022-09-16T18:15:17.820000", "db": "NVD", "id": "CVE-2022-38997" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-434768" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016782" }, { "date": "2022-09-17T03:47:48.817000", "db": "NVD", "id": "CVE-2022-38997" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-173" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-173" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016782" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-173" } ], "trust": 0.6 } }
var-202110-1494
Vulnerability from variot
There is an Out-of-bounds read vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei Smartphone is a smartphone of China's Huawei (Huawei) company.
A buffer overflow vulnerability exists in many Huawei devices, which is caused by an out-of-bounds read error in the product
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1494", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "NVD", "id": "CVE-2021-22487" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22487" } ] }, "cve": "CVE-2021-22487", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22487", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2021-84230", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380922", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22487", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22487", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2021-84230", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2077", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380922", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "VULHUB", "id": "VHN-380922" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "NVD", "id": "CVE-2021-22487" }, { "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones contain an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. Huawei Smartphone is a smartphone of China\u0027s Huawei (Huawei) company. \n\r\n\r\nA buffer overflow vulnerability exists in many Huawei devices, which is caused by an out-of-bounds read error in the product", "sources": [ { "db": "NVD", "id": "CVE-2021-22487" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "VULHUB", "id": "VHN-380922" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22487", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-014313", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-84230", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202110-2077", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380922", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "VULHUB", "id": "VHN-380922" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "NVD", "id": "CVE-2021-22487" }, { "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "id": "VAR-202110-1494", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "VULHUB", "id": "VHN-380922" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" } ] }, "last_update_date": "2023-12-18T13:22:41.660000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22487", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Patch for Huawei Smartphone Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/296746" }, { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168217" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380922" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "NVD", "id": "CVE-2021-22487" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22487" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "VULHUB", "id": "VHN-380922" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "NVD", "id": "CVE-2021-22487" }, { "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-84230" }, { "db": "VULHUB", "id": "VHN-380922" }, { "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "db": "NVD", "id": "CVE-2021-22487" }, { "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-05T00:00:00", "db": "CNVD", "id": "CNVD-2021-84230" }, { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380922" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "date": "2021-10-28T13:15:10.187000", "db": "NVD", "id": "CVE-2021-22487" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-05T00:00:00", "db": "CNVD", "id": "CNVD-2021-84230" }, { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380922" }, { "date": "2022-10-12T08:39:00", "db": "JVNDB", "id": "JVNDB-2021-014313" }, { "date": "2021-11-01T23:44:22.897000", "db": "NVD", "id": "CVE-2021-22487" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2077" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2077" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014313" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2077" } ], "trust": 0.6 } }
var-202104-1919
Vulnerability from variot
A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers may exploit this vulnerability by carefully constructing attack scenarios to cause out-of-bounds read. Huawei A classic buffer overflow vulnerability exists in smartphones.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202104-1919", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "NVD", "id": "CVE-2020-9147" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9147" } ] }, "cve": "CVE-2020-9147", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9147", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-187272", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9147", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9147", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202104-026", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-187272", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-9147", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187272" }, { "db": "VULMON", "id": "CVE-2020-9147" }, { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "NVD", "id": "CVE-2020-9147" }, { "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers may exploit this vulnerability by carefully constructing attack scenarios to cause out-of-bounds read. Huawei A classic buffer overflow vulnerability exists in smartphones.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2020-9147" }, { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "VULHUB", "id": "VHN-187272" }, { "db": "VULMON", "id": "CVE-2020-9147" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9147", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2020-016439", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202104-026", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187272", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-9147", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187272" }, { "db": "VULMON", "id": "CVE-2020-9147" }, { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "NVD", "id": "CVE-2020-9147" }, { "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "id": "VAR-202104-1919", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187272" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:47:09.802000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0 Security update \u00a02021 Year 1 Moon", "trust": 0.8, "url": "https://consumer.huawei.com/jp/support/bulletin/2021/1/" }, { "title": "Huawei Emui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146444" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-120", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187272" }, { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "NVD", "id": "CVE-2020-9147" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9147" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187272" }, { "db": "VULMON", "id": "CVE-2020-9147" }, { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "NVD", "id": "CVE-2020-9147" }, { "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187272" }, { "db": "VULMON", "id": "CVE-2020-9147" }, { "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "db": "NVD", "id": "CVE-2020-9147" }, { "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-01T00:00:00", "db": "VULHUB", "id": "VHN-187272" }, { "date": "2021-04-01T00:00:00", "db": "VULMON", "id": "CVE-2020-9147" }, { "date": "2021-12-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "date": "2021-04-01T18:15:12.417000", "db": "NVD", "id": "CVE-2020-9147" }, { "date": "2021-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-187272" }, { "date": "2021-04-05T00:00:00", "db": "VULMON", "id": "CVE-2020-9147" }, { "date": "2021-12-03T09:05:00", "db": "JVNDB", "id": "JVNDB-2020-016439" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2020-9147" }, { "date": "2021-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-026" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-026" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Classic buffer overflow vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016439" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-026" } ], "trust": 0.6 } }
var-202208-0445
Vulnerability from variot
The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by a flaw introduced in the design process
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0445", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40030" } ] }, "cve": "CVE-2021-40030", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40030", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40030", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2395", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by a flaw introduced in the design process", "sources": [ { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "VULHUB", "id": "VHN-401431" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40030", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-020148", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2395", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401431", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401431" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "id": "VAR-202208-0445", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401431" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:47.937000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204203" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40030" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40030/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401431" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401431" }, { "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "db": "NVD", "id": "CVE-2021-40030" }, { "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-401431" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "date": "2022-08-10T20:15:22.347000", "db": "NVD", "id": "CVE-2021-40030" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "VULHUB", "id": "VHN-401431" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020148" }, { "date": "2022-08-12T21:20:01.687000", "db": "NVD", "id": "CVE-2021-40030" }, { "date": "2022-08-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2395" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2395" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020148" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2395" } ], "trust": 0.6 } }
var-202209-0201
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0201", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38990" } ] }, "cve": "CVE-2022-38990", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38990", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38990", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-206", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "VULHUB", "id": "VHN-428491" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38990", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016789", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-206", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428491", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428491" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "id": "VAR-202209-0201", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428491" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:44.630000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208096" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38990" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38990/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428491" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428491" }, { "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "db": "NVD", "id": "CVE-2022-38990" }, { "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428491" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "date": "2022-09-16T18:15:17.553000", "db": "NVD", "id": "CVE-2022-38990" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428491" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016789" }, { "date": "2022-09-17T03:45:28.350000", "db": "NVD", "id": "CVE-2022-38990" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-206" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-206" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016789" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-206" } ], "trust": 0.6 } }
var-202108-2198
Vulnerability from variot
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei Smartphone
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2198", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22438" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22438" } ] }, "cve": "CVE-2021-22438", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380873", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22438", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22438", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-126", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380873", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22438", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380873" }, { "db": "VULMON", "id": "CVE-2021-22438" }, { "db": "NVD", "id": "CVE-2021-22438" }, { "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei Smartphone", "sources": [ { "db": "NVD", "id": "CVE-2021-22438" }, { "db": "VULHUB", "id": "VHN-380873" }, { "db": "VULMON", "id": "CVE-2021-22438" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22438", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-126", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380873", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22438", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380873" }, { "db": "VULMON", "id": "CVE-2021-22438" }, { "db": "NVD", "id": "CVE-2021-22438" }, { "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "id": "VAR-202108-2198", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380873" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:29.647000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159080" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380873" }, { "db": "NVD", "id": "CVE-2021-22438" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22438" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380873" }, { "db": "VULMON", "id": "CVE-2021-22438" }, { "db": "NVD", "id": "CVE-2021-22438" }, { "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380873" }, { "db": "VULMON", "id": "CVE-2021-22438" }, { "db": "NVD", "id": "CVE-2021-22438" }, { "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380873" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22438" }, { "date": "2021-08-02T17:15:14.520000", "db": "NVD", "id": "CVE-2021-22438" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380873" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22438" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22438" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-126" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-126" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-126" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-126" } ], "trust": 0.6 } }
var-202209-0140
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0140", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38988" } ] }, "cve": "CVE-2022-38988", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38988", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38988", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-193", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "VULHUB", "id": "VHN-428500" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38988", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016791", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-193", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428500", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428500" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "id": "VAR-202209-0140", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428500" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:21.546000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208089" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38988" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38988/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428500" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428500" }, { "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "db": "NVD", "id": "CVE-2022-38988" }, { "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428500" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "date": "2022-09-16T18:15:17.477000", "db": "NVD", "id": "CVE-2022-38988" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428500" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016791" }, { "date": "2022-09-17T03:46:28.717000", "db": "NVD", "id": "CVE-2022-38988" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-193" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-193" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016791" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-193" } ], "trust": 0.6 } }
var-202209-0452
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0452", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38991" } ] }, "cve": "CVE-2022-38991", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38991", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38991", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-185", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "VULHUB", "id": "VHN-428507" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38991", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016788", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-185", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428507", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428507" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "id": "VAR-202209-0452", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428507" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:12.481000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208087" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38991" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38991/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428507" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428507" }, { "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "db": "NVD", "id": "CVE-2022-38991" }, { "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428507" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "date": "2022-09-16T18:15:17.590000", "db": "NVD", "id": "CVE-2022-38991" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428507" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016788" }, { "date": "2022-09-17T03:46:16.633000", "db": "NVD", "id": "CVE-2022-38991" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-185" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-185" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016788" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-185" } ], "trust": 0.6 } }
var-202106-0596
Vulnerability from variot
There is a Security Features Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0596", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22372" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22372" } ] }, "cve": "CVE-2021-22372", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380807", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22372", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22372", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1983", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380807", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22372", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380807" }, { "db": "VULMON", "id": "CVE-2021-22372" }, { "db": "NVD", "id": "CVE-2021-22372" }, { "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Security Features Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22372" }, { "db": "VULHUB", "id": "VHN-380807" }, { "db": "VULMON", "id": "CVE-2021-22372" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22372", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1983", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380807", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22372", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380807" }, { "db": "VULMON", "id": "CVE-2021-22372" }, { "db": "NVD", "id": "CVE-2021-22372" }, { "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "id": "VAR-202106-0596", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380807" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:32.250000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156067" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22372" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380807" }, { "db": "VULMON", "id": "CVE-2021-22372" }, { "db": "NVD", "id": "CVE-2021-22372" }, { "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380807" }, { "db": "VULMON", "id": "CVE-2021-22372" }, { "db": "NVD", "id": "CVE-2021-22372" }, { "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380807" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22372" }, { "date": "2021-06-30T14:15:08.623000", "db": "NVD", "id": "CVE-2021-22372" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380807" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22372" }, { "date": "2021-07-06T15:22:47.827000", "db": "NVD", "id": "CVE-2021-22372" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1983" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1983" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1983" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1983" } ], "trust": 0.6 } }
var-202110-1488
Vulnerability from variot
There is a issue that nodes in the linked list being freed for multiple times in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause the system to restart. Huawei Smartphones contain a race condition vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1488", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "NVD", "id": "CVE-2021-36987" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36987" } ] }, "cve": "CVE-2021-36987", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36987", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-398819", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36987", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36987", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2086", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398819", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398819" }, { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "NVD", "id": "CVE-2021-36987" }, { "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a issue that nodes in the linked list being freed for multiple times in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause the system to restart. Huawei Smartphones contain a race condition vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36987" }, { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "VULHUB", "id": "VHN-398819" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36987", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014307", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2086", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398819", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398819" }, { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "NVD", "id": "CVE-2021-36987" }, { "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "id": "VAR-202110-1488", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398819" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:05.563000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36987", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171602" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398819" }, { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "NVD", "id": "CVE-2021-36987" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36987" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398819" }, { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "NVD", "id": "CVE-2021-36987" }, { "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398819" }, { "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "db": "NVD", "id": "CVE-2021-36987" }, { "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398819" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "date": "2021-10-28T13:15:10.443000", "db": "NVD", "id": "CVE-2021-36987" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398819" }, { "date": "2022-10-12T08:22:00", "db": "JVNDB", "id": "JVNDB-2021-014307" }, { "date": "2021-11-01T23:14:51.270000", "db": "NVD", "id": "CVE-2021-36987" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2086" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2086" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Race Condition Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014307" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2086" } ], "trust": 0.6 } }
var-202203-0976
Vulnerability from variot
There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0976", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40064" } ] }, "cve": "CVE-2021-40064", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40064", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401465", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40064", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40064", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-971", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401465", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "VULHUB", "id": "VHN-401465" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40064", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018700", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-971", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401465", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "id": "VAR-202203-0976", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401465" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:15.763000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186004" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40064" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40064/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401465" }, { "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "db": "NVD", "id": "CVE-2021-40064" }, { "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401465" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "date": "2022-03-10T17:43:24.960000", "db": "NVD", "id": "CVE-2021-40064" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401465" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018700" }, { "date": "2022-03-14T16:17:26.763000", "db": "NVD", "id": "CVE-2021-40064" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-971" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-971" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018700" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-971" } ], "trust": 0.6 } }
var-202112-0345
Vulnerability from variot
There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0345", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37069" } ] }, "cve": "CVE-2021-37069", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37069", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-398903", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.4, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37069", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37069", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2033", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398903", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected. plural Huawei A race condition vulnerability exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "VULHUB", "id": "VHN-398903" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37069", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015863", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2033", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398903", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "id": "VAR-202112-0345", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398903" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:05.164000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Race\u00a0condition\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173792" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37069" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398903" }, { "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "db": "NVD", "id": "CVE-2021-37069" }, { "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398903" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "date": "2021-12-08T15:15:09.757000", "db": "NVD", "id": "CVE-2021-37069" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398903" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015863" }, { "date": "2021-12-09T17:56:13.047000", "db": "NVD", "id": "CVE-2021-37069" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2033" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Race Condition Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015863" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2033" } ], "trust": 0.6 } }
var-202206-0120
Vulnerability from variot
The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0120", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31757" } ] }, "cve": "CVE-2022-31757", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31757", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423590", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31757", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31757", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-470", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423590", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31757", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012034", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-470", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66174", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423590", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31757", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "id": "VAR-202206-0120", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423590" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:05.452000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=198078" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31757" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31757/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423590" }, { "db": "VULMON", "id": "CVE-2022-31757" }, { "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "db": "NVD", "id": "CVE-2022-31757" }, { "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423590" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31757" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "date": "2022-06-13T16:15:08.723000", "db": "NVD", "id": "CVE-2022-31757" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423590" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31757" }, { "date": "2023-08-25T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-012034" }, { "date": "2022-06-27T16:14:54.070000", "db": "NVD", "id": "CVE-2022-31757" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-470" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-470" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012034" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-470" } ], "trust": 0.6 } }
var-202209-0121
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0121", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38993" } ] }, "cve": "CVE-2022-38993", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38993", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38993", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-205", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "VULHUB", "id": "VHN-428492" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38993", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016786", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-205", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428492", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428492" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "id": "VAR-202209-0121", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428492" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:40.015000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208095" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38993" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38993/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428492" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428492" }, { "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "db": "NVD", "id": "CVE-2022-38993" }, { "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428492" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "date": "2022-09-16T18:15:17.667000", "db": "NVD", "id": "CVE-2022-38993" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428492" }, { "date": "2023-10-06T08:09:00", "db": "JVNDB", "id": "JVNDB-2022-016786" }, { "date": "2022-09-17T03:11:51.240000", "db": "NVD", "id": "CVE-2022-38993" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-205" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-205" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016786" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-205" } ], "trust": 0.6 } }
var-202205-0250
Vulnerability from variot
There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to cause a denial of service
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0250", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-29793" } ] }, "cve": "CVE-2022-29793", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29793", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-421302", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-29793", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-29793", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2543", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-421302", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-29793", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a configuration defect in the activation lock of mobile phones.Successful exploitation of this vulnerability may affect application availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. An attacker could exploit this vulnerability to cause a denial of service", "sources": [ { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-29793", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009628", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2543", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-57610", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-421302", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-29793", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "id": "VAR-202205-0250", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-421302" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:24.584000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193765" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-29793 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-29793" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-29793/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-29793" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-421302" }, { "db": "VULMON", "id": "CVE-2022-29793" }, { "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "db": "NVD", "id": "CVE-2022-29793" }, { "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-421302" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-29793" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "date": "2022-05-13T15:15:09.937000", "db": "NVD", "id": "CVE-2022-29793" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-10T00:00:00", "db": "VULHUB", "id": "VHN-421302" }, { "date": "2023-02-10T00:00:00", "db": "VULMON", "id": "CVE-2022-29793" }, { "date": "2023-08-07T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-009628" }, { "date": "2023-02-10T16:46:32.607000", "db": "NVD", "id": "CVE-2022-29793" }, { "date": "2022-06-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2543" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2543" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009628" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2543" } ], "trust": 0.6 } }
var-202110-1495
Vulnerability from variot
There is a issue of Unstandardized field names in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1495", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "NVD", "id": "CVE-2021-22486" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22486" } ] }, "cve": "CVE-2021-22486", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22486", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380921", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22486", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22486", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2076", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380921", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380921" }, { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "NVD", "id": "CVE-2021-22486" }, { "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a issue of Unstandardized field names in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22486" }, { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "VULHUB", "id": "VHN-380921" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22486", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014314", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2076", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380921", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380921" }, { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "NVD", "id": "CVE-2021-22486" }, { "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "id": "VAR-202110-1495", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380921" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:26.841000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22486", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171578" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "NVD", "id": "CVE-2021-22486" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22486" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380921" }, { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "NVD", "id": "CVE-2021-22486" }, { "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380921" }, { "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "db": "NVD", "id": "CVE-2021-22486" }, { "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380921" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "date": "2021-10-28T13:15:10.147000", "db": "NVD", "id": "CVE-2021-22486" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380921" }, { "date": "2022-10-12T08:41:00", "db": "JVNDB", "id": "JVNDB-2021-014314" }, { "date": "2021-11-01T23:53:29.690000", "db": "NVD", "id": "CVE-2021-22486" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2076" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2076" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014314" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2076" } ], "trust": 0.6 } }
var-202111-1764
Vulnerability from variot
There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei A vulnerability related to improper default permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a sensitive information disclosure vulnerability in the Huawei HarmonyOS SIM dual card management component. An attacker could exploit this vulnerability to compromise confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1764", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39967" } ] }, "cve": "CVE-2021-39967", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39967", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401368", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39967", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39967", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2136", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401368", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei A vulnerability related to improper default permissions exists in smartphone products.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a sensitive information disclosure vulnerability in the Huawei HarmonyOS SIM dual card management component. An attacker could exploit this vulnerability to compromise confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39967", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017614", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2136", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-14782", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401368", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39967", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "id": "VAR-202111-1764", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401368" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:41.522000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176797" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39967" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401368" }, { "db": "VULMON", "id": "CVE-2021-39967" }, { "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "db": "NVD", "id": "CVE-2021-39967" }, { "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401368" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39967" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "date": "2022-01-03T22:15:10", "db": "NVD", "id": "CVE-2021-39967" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401368" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39967" }, { "date": "2023-01-27T07:25:00", "db": "JVNDB", "id": "JVNDB-2021-017614" }, { "date": "2022-01-13T16:23:38.167000", "db": "NVD", "id": "CVE-2021-39967" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2136" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2136" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Improper Default Permission Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017614" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2136" } ], "trust": 0.6 } }
var-202112-0136
Vulnerability from variot
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0136", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "NVD", "id": "CVE-2021-37042" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37042" } ] }, "cve": "CVE-2021-37042", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37042", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398875", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37042", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37042", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202112-465", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398875", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398875" }, { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "NVD", "id": "CVE-2021-37042" }, { "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37042" }, { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "VULHUB", "id": "VHN-398875" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37042", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015794", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-465", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398875", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398875" }, { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "NVD", "id": "CVE-2021-37042" }, { "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "id": "VAR-202112-0136", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398875" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:47.390000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173137" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398875" }, { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "NVD", "id": "CVE-2021-37042" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.6, "url": "https://consumer.huawei.com/om/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37042" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398875" }, { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "NVD", "id": "CVE-2021-37042" }, { "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398875" }, { "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "db": "NVD", "id": "CVE-2021-37042" }, { "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398875" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "date": "2021-12-07T16:15:07.457000", "db": "NVD", "id": "CVE-2021-37042" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398875" }, { "date": "2022-11-30T05:01:00", "db": "JVNDB", "id": "JVNDB-2021-015794" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37042" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-465" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-465" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015794" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-465" } ], "trust": 0.6 } }
var-202106-1924
Vulnerability from variot
There is a Memory Buffer Improper Operation Limit vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause exceptions in image processing. Huawei A buffer error vulnerability exists in smartphones.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1924", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "NVD", "id": "CVE-2021-22335" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22335" } ] }, "cve": "CVE-2021-22335", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22335", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380770", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22335", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22335", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-258", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380770", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380770" }, { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "NVD", "id": "CVE-2021-22335" }, { "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Improper Operation Limit vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause exceptions in image processing. Huawei A buffer error vulnerability exists in smartphones.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22335" }, { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "VULHUB", "id": "VHN-380770" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22335", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007572", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-258", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380770", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380770" }, { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "NVD", "id": "CVE-2021-22335" }, { "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "id": "VAR-202106-1924", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380770" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:59.864000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0April\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "title": "Repair measures for Huawei smartphone buffer error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153903" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380770" }, { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "NVD", "id": "CVE-2021-22335" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22335" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380770" }, { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "NVD", "id": "CVE-2021-22335" }, { "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380770" }, { "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "db": "NVD", "id": "CVE-2021-22335" }, { "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380770" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "date": "2021-06-03T20:15:08.500000", "db": "NVD", "id": "CVE-2021-22335" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380770" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007572" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22335" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-258" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-258" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Buffer error vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007572" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-258" } ], "trust": 0.6 } }
var-202110-1484
Vulnerability from variot
There is a Public key verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1484", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "NVD", "id": "CVE-2021-36992" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36992" } ] }, "cve": "CVE-2021-36992", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36992", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398825", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-36992", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36992", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2090", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398825", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398825" }, { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "NVD", "id": "CVE-2021-36992" }, { "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Public key verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-36992" }, { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "VULHUB", "id": "VHN-398825" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36992", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014266", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2090", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398825", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398825" }, { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "NVD", "id": "CVE-2021-36992" }, { "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "id": "VAR-202110-1484", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398825" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:12.614000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36992", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168228" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "NVD", "id": "CVE-2021-36992" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36992" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398825" }, { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "NVD", "id": "CVE-2021-36992" }, { "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398825" }, { "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "db": "NVD", "id": "CVE-2021-36992" }, { "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398825" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "date": "2021-10-28T13:15:10.657000", "db": "NVD", "id": "CVE-2021-36992" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398825" }, { "date": "2022-10-11T08:57:00", "db": "JVNDB", "id": "JVNDB-2021-014266" }, { "date": "2021-11-01T23:13:21.843000", "db": "NVD", "id": "CVE-2021-36992" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2090" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2090" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014266" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2090" } ], "trust": 0.6 } }
var-202209-0253
Vulnerability from variot
The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0253", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39000" } ] }, "cve": "CVE-2022-39000", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39000", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39000", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-212", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39000", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017154", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-212", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-81255", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428487", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39000", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "id": "VAR-202209-0253", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428487" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:37.910000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208409" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39000" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39000/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428487" }, { "db": "VULMON", "id": "CVE-2022-39000" }, { "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "db": "NVD", "id": "CVE-2022-39000" }, { "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428487" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39000" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "date": "2022-09-16T18:15:17.900000", "db": "NVD", "id": "CVE-2022-39000" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-428487" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39000" }, { "date": "2023-10-11T08:51:00", "db": "JVNDB", "id": "JVNDB-2022-017154" }, { "date": "2022-09-20T19:07:54.390000", "db": "NVD", "id": "CVE-2022-39000" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-212" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-212" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017154" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-212" } ], "trust": 0.6 } }
var-202208-0488
Vulnerability from variot
The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability in inserting or modifying arguments.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0488", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37005" } ] }, "cve": "CVE-2022-37005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-37005", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37005", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2396", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability in inserting or modifying arguments.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37005", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014551", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2396", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427497", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37005", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "id": "VAR-202208-0488", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427497" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:39.778000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Repair measures for parameter injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204366" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-88", "trust": 1.1 }, { "problemtype": "Insert or change arguments (CWE-88) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37005" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37005/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427497" }, { "db": "VULMON", "id": "CVE-2022-37005" }, { "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "db": "NVD", "id": "CVE-2022-37005" }, { "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427497" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37005" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "date": "2022-08-10T20:16:04.443000", "db": "NVD", "id": "CVE-2022-37005" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427497" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37005" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014551" }, { "date": "2022-08-15T18:00:07.387000", "db": "NVD", "id": "CVE-2022-37005" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2396" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2396" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Argument insertion or modification vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014551" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "parameter injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2396" } ], "trust": 0.6 } }
var-202108-2210
Vulnerability from variot
There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei Smartphone
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2210", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22445" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22445" } ] }, "cve": "CVE-2021-22445", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380880", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22445", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22445", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-130", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380880", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22445", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380880" }, { "db": "VULMON", "id": "CVE-2021-22445" }, { "db": "NVD", "id": "CVE-2021-22445" }, { "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei Smartphone", "sources": [ { "db": "NVD", "id": "CVE-2021-22445" }, { "db": "VULHUB", "id": "VHN-380880" }, { "db": "VULMON", "id": "CVE-2021-22445" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22445", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-130", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380880", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22445", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380880" }, { "db": "VULMON", "id": "CVE-2021-22445" }, { "db": "NVD", "id": "CVE-2021-22445" }, { "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "id": "VAR-202108-2210", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380880" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:13.672000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159192" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380880" }, { "db": "NVD", "id": "CVE-2021-22445" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22445" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380880" }, { "db": "VULMON", "id": "CVE-2021-22445" }, { "db": "NVD", "id": "CVE-2021-22445" }, { "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380880" }, { "db": "VULMON", "id": "CVE-2021-22445" }, { "db": "NVD", "id": "CVE-2021-22445" }, { "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380880" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22445" }, { "date": "2021-08-02T18:15:08.543000", "db": "NVD", "id": "CVE-2021-22445" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380880" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22445" }, { "date": "2021-12-09T17:57:49.973000", "db": "NVD", "id": "CVE-2021-22445" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-130" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-130" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-130" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-130" } ], "trust": 0.6 } }
var-202110-1483
Vulnerability from variot
There is a Memory leaks vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei There is a vulnerability in smartphones related to lack of free memory after expiration.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1483", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "NVD", "id": "CVE-2021-36993" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36993" } ] }, "cve": "CVE-2021-36993", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36993", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398826", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36993", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36993", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2091", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398826", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398826" }, { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "NVD", "id": "CVE-2021-36993" }, { "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory leaks vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei There is a vulnerability in smartphones related to lack of free memory after expiration.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36993" }, { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "VULHUB", "id": "VHN-398826" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36993", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014265", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2091", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398826", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398826" }, { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "NVD", "id": "CVE-2021-36993" }, { "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "id": "VAR-202110-1483", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398826" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:00.612000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36993", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168229" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398826" }, { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "NVD", "id": "CVE-2021-36993" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36993" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398826" }, { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "NVD", "id": "CVE-2021-36993" }, { "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398826" }, { "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "db": "NVD", "id": "CVE-2021-36993" }, { "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398826" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "date": "2021-10-28T13:15:10.697000", "db": "NVD", "id": "CVE-2021-36993" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-398826" }, { "date": "2022-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-014265" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-36993" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2091" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2091" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014265" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2091" } ], "trust": 0.6 } }
var-202204-0754
Vulnerability from variot
The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles. An attacker could exploit this vulnerability to cause unauthorized access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0754", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22256" } ] }, "cve": "CVE-2022-22256", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-22256", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-409785", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22256", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22256", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2017", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409785", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22256", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles. An attacker could exploit this vulnerability to cause unauthorized access", "sources": [ { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22256", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-008143", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2017", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44625", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409785", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22256", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "id": "VAR-202204-0754", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409785" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:14.353000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=190069" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22256" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22256/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409785" }, { "db": "VULMON", "id": "CVE-2022-22256" }, { "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "db": "NVD", "id": "CVE-2022-22256" }, { "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409785" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22256" }, { "date": "2023-07-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "date": "2022-04-11T20:15:19.657000", "db": "NVD", "id": "CVE-2022-22256" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-19T00:00:00", "db": "VULHUB", "id": "VHN-409785" }, { "date": "2022-04-19T00:00:00", "db": "VULMON", "id": "CVE-2022-22256" }, { "date": "2023-07-24T08:23:00", "db": "JVNDB", "id": "JVNDB-2022-008143" }, { "date": "2022-04-19T14:49:07.153000", "db": "NVD", "id": "CVE-2022-22256" }, { "date": "2022-04-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2017" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2017" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-008143" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2017" } ], "trust": 0.6 } }
var-202203-0266
Vulnerability from variot
There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0266", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "NVD", "id": "CVE-2021-40058" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40058" } ] }, "cve": "CVE-2021-40058", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40058", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401459", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40058", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40058", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-977", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401459", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401459" }, { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "NVD", "id": "CVE-2021-40058" }, { "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40058" }, { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "VULHUB", "id": "VHN-401459" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40058", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018706", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-977", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401459", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401459" }, { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "NVD", "id": "CVE-2021-40058" }, { "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "id": "VAR-202203-0266", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401459" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:51.372000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185891" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401459" }, { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "NVD", "id": "CVE-2021-40058" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40058" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40058/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401459" }, { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "NVD", "id": "CVE-2021-40058" }, { "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401459" }, { "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "db": "NVD", "id": "CVE-2021-40058" }, { "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401459" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "date": "2022-03-10T17:43:22.340000", "db": "NVD", "id": "CVE-2021-40058" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401459" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018706" }, { "date": "2022-03-14T16:04:13.283000", "db": "NVD", "id": "CVE-2021-40058" }, { "date": "2022-03-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-977" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-977" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018706" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-977" } ], "trust": 0.6 } }
var-202111-1584
Vulnerability from variot
There is an Injection attack vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have an injection vulnerability.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Huawei Emui and Magic UI have injection attack vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1584", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "NVD", "id": "CVE-2021-37033" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37033" } ] }, "cve": "CVE-2021-37033", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37033", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398866", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37033", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37033", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1902", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398866", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398866" }, { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "NVD", "id": "CVE-2021-37033" }, { "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Injection attack vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have an injection vulnerability.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Huawei Emui and Magic UI have injection attack vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37033" }, { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "VULHUB", "id": "VHN-398866" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37033", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015553", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1902", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102864", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398866", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398866" }, { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "NVD", "id": "CVE-2021-37033" }, { "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "id": "VAR-202111-1584", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398866" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:54.247000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "Huawei Emui Repair measures for injecting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172197" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-74", "trust": 1.1 }, { "problemtype": "injection (CWE-74) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398866" }, { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "NVD", "id": "CVE-2021-37033" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37033" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398866" }, { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "NVD", "id": "CVE-2021-37033" }, { "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398866" }, { "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "db": "NVD", "id": "CVE-2021-37033" }, { "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398866" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "date": "2021-11-23T16:15:09.833000", "db": "NVD", "id": "CVE-2021-37033" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398866" }, { "date": "2022-11-24T06:21:00", "db": "JVNDB", "id": "JVNDB-2021-015553" }, { "date": "2021-12-09T17:57:49.643000", "db": "NVD", "id": "CVE-2021-37033" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1902" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1902" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Injection Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015553" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1902" } ], "trust": 0.6 } }
var-202110-1501
Vulnerability from variot
There is an Out-of-bounds memory access in Huawei Smartphone.Successful exploitation of this vulnerability may cause process exceptions. Huawei Smartphones contain an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1501", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "NVD", "id": "CVE-2021-22474" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22474" } ] }, "cve": "CVE-2021-22474", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22474", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380909", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22474", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22474", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2068", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380909", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380909" }, { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "NVD", "id": "CVE-2021-22474" }, { "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds memory access in Huawei Smartphone.Successful exploitation of this vulnerability may cause process exceptions. Huawei Smartphones contain an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22474" }, { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "VULHUB", "id": "VHN-380909" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22474", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014320", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2068", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380909", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380909" }, { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "NVD", "id": "CVE-2021-22474" }, { "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "id": "VAR-202110-1501", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380909" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:11.810000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22474", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168395" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380909" }, { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "NVD", "id": "CVE-2021-22474" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22474" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380909" }, { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "NVD", "id": "CVE-2021-22474" }, { "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380909" }, { "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "db": "NVD", "id": "CVE-2021-22474" }, { "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380909" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "date": "2021-10-28T13:15:09.833000", "db": "NVD", "id": "CVE-2021-22474" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380909" }, { "date": "2022-10-12T08:50:00", "db": "JVNDB", "id": "JVNDB-2021-014320" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22474" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2068" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2068" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-Bounds Read Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014320" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2068" } ], "trust": 0.6 } }
var-202201-1715
Vulnerability from variot
There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI contains a double free vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1715", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40038" } ] }, "cve": "CVE-2021-40038", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40038", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401439", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40038", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40038", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-307", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401439", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-40038", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI contains a double free vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40038", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-002910", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-307", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401439", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40038", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "id": "VAR-202201-1715", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401439" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:47.540000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177453" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40038" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202201-0000001239056313" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/415.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401439" }, { "db": "VULMON", "id": "CVE-2021-40038" }, { "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "db": "NVD", "id": "CVE-2021-40038" }, { "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401439" }, { "date": "2022-01-10T00:00:00", "db": "VULMON", "id": "CVE-2021-40038" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "date": "2022-01-10T14:10:22.707000", "db": "NVD", "id": "CVE-2021-40038" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401439" }, { "date": "2022-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-40038" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002910" }, { "date": "2022-01-13T15:38:03.063000", "db": "NVD", "id": "CVE-2021-40038" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-307" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-307" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product double free vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002910" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-307" } ], "trust": 0.6 } }
var-202110-1363
Vulnerability from variot
There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1363", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "NVD", "id": "CVE-2021-22401" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22401" } ] }, "cve": "CVE-2021-22401", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22401", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380836", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22401", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22401", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2032", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380836", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380836" }, { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "NVD", "id": "CVE-2021-22401" }, { "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22401" }, { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "VULHUB", "id": "VHN-380836" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22401", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014174", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2032", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380836", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380836" }, { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "NVD", "id": "CVE-2021-22401" }, { "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "id": "VAR-202110-1363", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380836" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:42.014000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=167714" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "NVD", "id": "CVE-2021-22401" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22401" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380836" }, { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "NVD", "id": "CVE-2021-22401" }, { "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380836" }, { "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "db": "NVD", "id": "CVE-2021-22401" }, { "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380836" }, { "date": "2022-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "date": "2021-10-28T13:15:08.427000", "db": "NVD", "id": "CVE-2021-22401" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380836" }, { "date": "2022-10-06T08:32:00", "db": "JVNDB", "id": "JVNDB-2021-014174" }, { "date": "2021-10-28T20:32:16.273000", "db": "NVD", "id": "CVE-2021-22401" }, { "date": "2021-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2032" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2032" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014174" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2032" } ], "trust": 0.6 } }
var-202206-0376
Vulnerability from variot
The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an improper permissions retention vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0376", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31755" } ] }, "cve": "CVE-2022-31755", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31755", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423588", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31755", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31755", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-475", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423588", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31755", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an improper permissions retention vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31755", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011281", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-475", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66179", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423588", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31755", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "id": "VAR-202206-0376", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423588" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:37.162000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=195990" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31755 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31755" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31755/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/281.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31755" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423588" }, { "db": "VULMON", "id": "CVE-2022-31755" }, { "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "db": "NVD", "id": "CVE-2022-31755" }, { "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423588" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31755" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "date": "2022-06-13T15:15:10.100000", "db": "NVD", "id": "CVE-2022-31755" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-05T00:00:00", "db": "VULHUB", "id": "VHN-423588" }, { "date": "2022-10-05T00:00:00", "db": "VULMON", "id": "CVE-2022-31755" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011281" }, { "date": "2022-10-05T14:59:00.427000", "db": "NVD", "id": "CVE-2022-31755" }, { "date": "2022-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-475" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-475" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product Improper Retention of Permissions Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011281" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-475" } ], "trust": 0.6 } }
var-202209-0123
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0123", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38987" } ] }, "cve": "CVE-2022-38987", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38987", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38987", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-201", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "VULHUB", "id": "VHN-428495" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38987", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016792", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-201", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428495", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428495" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "id": "VAR-202209-0123", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428495" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:31:58.934000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208093" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38987" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38987/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428495" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428495" }, { "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "db": "NVD", "id": "CVE-2022-38987" }, { "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428495" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "date": "2022-09-16T18:15:17.437000", "db": "NVD", "id": "CVE-2022-38987" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428495" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016792" }, { "date": "2022-09-17T03:46:36.700000", "db": "NVD", "id": "CVE-2022-38987" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-201" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-201" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016792" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-201" } ], "trust": 0.6 } }
var-202110-1849
Vulnerability from variot
There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1849", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37114" } ] }, "cve": "CVE-2021-37114", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37114", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398950", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37114", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37114", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2232", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398950", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37114", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017375", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2232", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398950", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37114", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "id": "VAR-202110-1849", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398950" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:24.962000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176780" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37114" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398950" }, { "db": "VULMON", "id": "CVE-2021-37114" }, { "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "db": "NVD", "id": "CVE-2021-37114" }, { "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398950" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37114" }, { "date": "2023-01-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "date": "2022-01-03T22:15:09.227000", "db": "NVD", "id": "CVE-2021-37114" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398950" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37114" }, { "date": "2023-01-17T06:34:00", "db": "JVNDB", "id": "JVNDB-2021-017375" }, { "date": "2022-01-11T19:39:59.973000", "db": "NVD", "id": "CVE-2021-37114" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2232" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2232" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017375" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2232" } ], "trust": 0.6 } }
var-202110-1478
Vulnerability from variot
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to read an array that is out of bounds. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1478", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "NVD", "id": "CVE-2021-36998" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36998" } ] }, "cve": "CVE-2021-36998", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36998", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-397933", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-36998", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36998", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2098", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-397933", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-397933" }, { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "NVD", "id": "CVE-2021-36998" }, { "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to read an array that is out of bounds. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-36998" }, { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "VULHUB", "id": "VHN-397933" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36998", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014260", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2098", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-397933", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-397933" }, { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "NVD", "id": "CVE-2021-36998" }, { "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "id": "VAR-202110-1478", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-397933" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:55.915000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36998", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168235" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "NVD", "id": "CVE-2021-36998" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36998" } ], "sources": [ { "db": "VULHUB", "id": "VHN-397933" }, { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "NVD", "id": "CVE-2021-36998" }, { "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-397933" }, { "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "db": "NVD", "id": "CVE-2021-36998" }, { "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-397933" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "date": "2021-10-28T13:15:10.913000", "db": "NVD", "id": "CVE-2021-36998" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-397933" }, { "date": "2022-10-11T08:37:00", "db": "JVNDB", "id": "JVNDB-2021-014260" }, { "date": "2021-11-01T20:50:04.947000", "db": "NVD", "id": "CVE-2021-36998" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2098" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2098" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014260" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2098" } ], "trust": 0.6 } }
var-202209-0321
Vulnerability from variot
The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart. Huawei of EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0321", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39006" } ] }, "cve": "CVE-2022-39006", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-39006", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39006", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202209-202", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart. Huawei of EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39006", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017588", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-202", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64986", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428494", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39006", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "id": "VAR-202209-0321", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428494" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:14.188000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208617" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39006" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39006/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428494" }, { "db": "VULMON", "id": "CVE-2022-39006" }, { "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "db": "NVD", "id": "CVE-2022-39006" }, { "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428494" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39006" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "date": "2022-09-16T18:15:18.133000", "db": "NVD", "id": "CVE-2022-39006" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428494" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39006" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017588" }, { "date": "2022-09-21T12:55:11.720000", "db": "NVD", "id": "CVE-2022-39006" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-202" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-202" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product race condition vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017588" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-202" } ], "trust": 0.6 } }
var-202112-0138
Vulnerability from variot
There is an Improper access control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0138", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "NVD", "id": "CVE-2021-37038" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37038" } ] }, "cve": "CVE-2021-37038", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37038", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398871", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37038", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37038", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-460", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398871", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398871" }, { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "NVD", "id": "CVE-2021-37038" }, { "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper access control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android", "sources": [ { "db": "NVD", "id": "CVE-2021-37038" }, { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "VULHUB", "id": "VHN-398871" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37038", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015796", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-460", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102853", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398871", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398871" }, { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "NVD", "id": "CVE-2021-37038" }, { "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "id": "VAR-202112-0138", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398871" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:41.397000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173132" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398871" }, { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "NVD", "id": "CVE-2021-37038" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37038" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398871" }, { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "NVD", "id": "CVE-2021-37038" }, { "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398871" }, { "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "db": "NVD", "id": "CVE-2021-37038" }, { "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398871" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "date": "2021-12-07T16:15:07.377000", "db": "NVD", "id": "CVE-2021-37038" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398871" }, { "date": "2022-11-30T05:12:00", "db": "JVNDB", "id": "JVNDB-2021-015796" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37038" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-460" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-460" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015796" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-460" } ], "trust": 0.6 } }
var-202106-0613
Vulnerability from variot
There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may induce users to grant permissions on modifying items in the configuration table,causing system exceptions. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0613", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22351" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22351" } ] }, "cve": "CVE-2021-22351", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-380786", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CVE-2021-22351", "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22351", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-2011", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380786", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22351", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380786" }, { "db": "VULMON", "id": "CVE-2021-22351" }, { "db": "NVD", "id": "CVE-2021-22351" }, { "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Credentials Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may induce users to grant permissions on modifying items in the configuration table,causing system exceptions. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.1, EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22351" }, { "db": "VULHUB", "id": "VHN-380786" }, { "db": "VULMON", "id": "CVE-2021-22351" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22351", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2011", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380786", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22351", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380786" }, { "db": "VULMON", "id": "CVE-2021-22351" }, { "db": "NVD", "id": "CVE-2021-22351" }, { "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "id": "VAR-202106-0613", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380786" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:36.778000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for vulnerabilities in trust management issues on Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156089" }, { "title": "CVE-2021-22351", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22351 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22351" }, { "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22351" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22351" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/522.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22351" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380786" }, { "db": "VULMON", "id": "CVE-2021-22351" }, { "db": "NVD", "id": "CVE-2021-22351" }, { "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380786" }, { "db": "VULMON", "id": "CVE-2021-22351" }, { "db": "NVD", "id": "CVE-2021-22351" }, { "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380786" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22351" }, { "date": "2021-06-30T21:15:09.867000", "db": "NVD", "id": "CVE-2021-22351" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380786" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22351" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22351" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2011" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2011" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone trust management issue vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2011" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "trust management problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2011" } ], "trust": 0.6 } }
var-202209-0449
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0449", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38989" } ] }, "cve": "CVE-2022-38989", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-38989", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38989", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-196", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "VULHUB", "id": "VHN-428498" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38989", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016790", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-196", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428498", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428498" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "id": "VAR-202209-0449", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428498" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:32.246000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208091" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38989" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38989/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428498" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428498" }, { "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "db": "NVD", "id": "CVE-2022-38989" }, { "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428498" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "date": "2022-09-16T18:15:17.513000", "db": "NVD", "id": "CVE-2022-38989" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428498" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016790" }, { "date": "2022-09-17T03:45:39.930000", "db": "NVD", "id": "CVE-2022-38989" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-196" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-196" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016790" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-196" } ], "trust": 0.6 } }
var-202101-1003
Vulnerability from variot
There is a missing authentication vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability may lead to low-sensitive information exposure. plural Huawei Smartphones are vulnerable to lack of authentication for critical features.Information may be obtained. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company. Huawei smartphones have security vulnerabilities that attackers can exploit to obtain low-sensitive information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1003", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "NVD", "id": "CVE-2020-9143" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9143" } ] }, "cve": "CVE-2020-9143", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9143", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-187268", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2020-9143", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9143", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202101-1097", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-187268", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187268" }, { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "NVD", "id": "CVE-2020-9143" }, { "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a missing authentication vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability may lead to low-sensitive information exposure. plural Huawei Smartphones are vulnerable to lack of authentication for critical features.Information may be obtained. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company. Huawei smartphones have security vulnerabilities that attackers can exploit to obtain low-sensitive information", "sources": [ { "db": "NVD", "id": "CVE-2020-9143" }, { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "VULHUB", "id": "VHN-187268" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9143", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015409", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1097", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-187268", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187268" }, { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "NVD", "id": "CVE-2020-9143" }, { "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "id": "VAR-202101-1003", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187268" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:39.304000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139457" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for important features (CWE-306) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187268" }, { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "NVD", "id": "CVE-2020-9143" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9143" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187268" }, { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "NVD", "id": "CVE-2020-9143" }, { "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187268" }, { "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "db": "NVD", "id": "CVE-2020-9143" }, { "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187268" }, { "date": "2021-09-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "date": "2021-01-13T22:15:14.177000", "db": "NVD", "id": "CVE-2020-9143" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-21T00:00:00", "db": "VULHUB", "id": "VHN-187268" }, { "date": "2021-09-21T09:03:00", "db": "JVNDB", "id": "JVNDB-2020-015409" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2020-9143" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1097" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1097" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability regarding lack of authentication for important functions in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015409" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1097" } ], "trust": 0.6 } }
var-202110-1497
Vulnerability from variot
There is a issue of IP address spoofing in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1497", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "NVD", "id": "CVE-2021-22483" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22483" } ] }, "cve": "CVE-2021-22483", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22483", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380918", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22483", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22483", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2074", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380918", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380918" }, { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "NVD", "id": "CVE-2021-22483" }, { "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a issue of IP address spoofing in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22483" }, { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "VULHUB", "id": "VHN-380918" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22483", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014316", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2074", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380918", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380918" }, { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "NVD", "id": "CVE-2021-22483" }, { "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "id": "VAR-202110-1497", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380918" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:16.936000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22483", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168214" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "NVD", "id": "CVE-2021-22483" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22483" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380918" }, { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "NVD", "id": "CVE-2021-22483" }, { "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380918" }, { "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "db": "NVD", "id": "CVE-2021-22483" }, { "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380918" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "date": "2021-10-28T13:15:10.050000", "db": "NVD", "id": "CVE-2021-22483" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380918" }, { "date": "2022-10-12T08:44:00", "db": "JVNDB", "id": "JVNDB-2021-014316" }, { "date": "2021-11-01T23:55:13.207000", "db": "NVD", "id": "CVE-2021-22483" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2074" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2074" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014316" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2074" } ], "trust": 0.6 } }
var-202110-1418
Vulnerability from variot
There is a vulnerability of hijacking unverified providers in Huawei Smartphone.Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1418", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "NVD", "id": "CVE-2021-22403" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22403" } ] }, "cve": "CVE-2021-22403", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22403", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380838", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22403", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22403", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2034", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380838", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380838" }, { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "NVD", "id": "CVE-2021-22403" }, { "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of hijacking unverified providers in Huawei Smartphone.Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands. Huawei Smartphones have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22403" }, { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "VULHUB", "id": "VHN-380838" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22403", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014459", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2034", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380838", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380838" }, { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "NVD", "id": "CVE-2021-22403" }, { "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "id": "VAR-202110-1418", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380838" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:00.676000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168385" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "NVD", "id": "CVE-2021-22403" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22403" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380838" }, { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "NVD", "id": "CVE-2021-22403" }, { "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380838" }, { "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "db": "NVD", "id": "CVE-2021-22403" }, { "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380838" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "date": "2021-10-28T13:15:08.530000", "db": "NVD", "id": "CVE-2021-22403" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380838" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014459" }, { "date": "2021-11-02T14:41:12.773000", "db": "NVD", "id": "CVE-2021-22403" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2034" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2034" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014459" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2034" } ], "trust": 0.6 } }
var-202106-0592
Vulnerability from variot
There is a Permission Control Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect normal use of the device. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There are security vulnerabilities in several Huawei SmartPhone, which stems from the lack of effective permissions and access control measures in the products. The following products and versions are affected: EMUI 10.1.1, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0592", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22368" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22368" } ] }, "cve": "CVE-2021-22368", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380803", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22368", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22368", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-2003", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380803", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22368", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380803" }, { "db": "VULMON", "id": "CVE-2021-22368" }, { "db": "NVD", "id": "CVE-2021-22368" }, { "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permission Control Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect normal use of the device. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There are security vulnerabilities in several Huawei SmartPhone, which stems from the lack of effective permissions and access control measures in the products. The following products and versions are affected: EMUI 10.1.1, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22368" }, { "db": "VULHUB", "id": "VHN-380803" }, { "db": "VULMON", "id": "CVE-2021-22368" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22368", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2003", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380803", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22368", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380803" }, { "db": "VULMON", "id": "CVE-2021-22368" }, { "db": "NVD", "id": "CVE-2021-22368" }, { "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "id": "VAR-202106-0592", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380803" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:36.804000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156082" }, { "title": "CVE-2021-22368", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22368 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22368" }, { "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380803" }, { "db": "NVD", "id": "CVE-2021-22368" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22368" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22368" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380803" }, { "db": "VULMON", "id": "CVE-2021-22368" }, { "db": "NVD", "id": "CVE-2021-22368" }, { "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380803" }, { "db": "VULMON", "id": "CVE-2021-22368" }, { "db": "NVD", "id": "CVE-2021-22368" }, { "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380803" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22368" }, { "date": "2021-06-30T18:15:08.540000", "db": "NVD", "id": "CVE-2021-22368" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380803" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22368" }, { "date": "2021-07-06T18:02:52.083000", "db": "NVD", "id": "CVE-2021-22368" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2003" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2003" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2003" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2003" } ], "trust": 0.6 } }
var-202209-0322
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0322", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38979" } ] }, "cve": "CVE-2022-38979", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38979", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38979", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-184", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "VULHUB", "id": "VHN-428508" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38979", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016793", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-184", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428508", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428508" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "id": "VAR-202209-0322", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428508" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:27.861000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208086" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38979" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38979/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428508" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428508" }, { "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "db": "NVD", "id": "CVE-2022-38979" }, { "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428508" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "date": "2022-09-16T18:15:17.387000", "db": "NVD", "id": "CVE-2022-38979" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428508" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016793" }, { "date": "2022-09-17T03:18:37.613000", "db": "NVD", "id": "CVE-2022-38979" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-184" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-184" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016793" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-184" } ], "trust": 0.6 } }
var-202207-0134
Vulnerability from variot
The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0. The vulnerability is due to the improper neutralization of the special elements used in the command. abnormal function
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0134", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34740" } ] }, "cve": "CVE-2022-34740", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34740", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-427089", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34740", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34740", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-397", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-427089", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-34740", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0. The vulnerability is due to the improper neutralization of the special elements used in the command. abnormal function", "sources": [ { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34740", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013200", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-397", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-57612", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427089", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34740", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "id": "VAR-202207-0134", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427089" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:22.245000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199746" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34740" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34740/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427089" }, { "db": "VULMON", "id": "CVE-2022-34740" }, { "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "db": "NVD", "id": "CVE-2022-34740" }, { "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427089" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34740" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "date": "2022-07-12T14:15:19.453000", "db": "NVD", "id": "CVE-2022-34740" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427089" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34740" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013200" }, { "date": "2022-07-19T14:08:05.747000", "db": "NVD", "id": "CVE-2022-34740" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-397" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-397" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013200" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-397" } ], "trust": 0.6 } }
var-202110-1485
Vulnerability from variot
There is an Unauthorized file access vulnerability in Huawei Smartphone due to unstandardized path input.Successful exploitation of this vulnerability by creating malicious file paths can cause unauthorized file access. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1485", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "NVD", "id": "CVE-2021-36991" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36991" } ] }, "cve": "CVE-2021-36991", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36991", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398824", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-36991", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36991", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2089", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398824", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398824" }, { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "NVD", "id": "CVE-2021-36991" }, { "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Huawei Smartphone due to unstandardized path input.Successful exploitation of this vulnerability by creating malicious file paths can cause unauthorized file access. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-36991" }, { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "VULHUB", "id": "VHN-398824" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36991", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014267", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2089", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398824", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398824" }, { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "NVD", "id": "CVE-2021-36991" }, { "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "id": "VAR-202110-1485", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398824" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:22.950000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36991", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168227" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398824" }, { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "NVD", "id": "CVE-2021-36991" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36991" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398824" }, { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "NVD", "id": "CVE-2021-36991" }, { "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398824" }, { "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "db": "NVD", "id": "CVE-2021-36991" }, { "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398824" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "date": "2021-10-28T13:15:10.613000", "db": "NVD", "id": "CVE-2021-36991" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398824" }, { "date": "2022-10-11T09:02:00", "db": "JVNDB", "id": "JVNDB-2021-014267" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-36991" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2089" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2089" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014267" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2089" } ], "trust": 0.6 } }
var-202112-0944
Vulnerability from variot
There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0944", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": null, "trust": 1.4, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39996" } ] }, "cve": "CVE-2021-39996", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39996", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-05170", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401397", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39996", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39996", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2022-05170", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-214", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401397", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based buffer overflow vulnerability with the NFC module in smartphones. Successful exploitation of this vulnerability may cause memory overflow. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS Wearables is an electronic watch made by Huawei from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39996", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-017522", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-05170", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202112-214", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401397", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "id": "VAR-202112-0944", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" } ] }, "last_update_date": "2023-12-18T12:26:32.581000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202112-0000001183296718 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "title": "Patch for Huawei HarmonyOS Wearables Heap Buffer Overflow Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/315096" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172738" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202112-0000001183296718" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39996" }, { "trust": 1.2, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202112-0000001183456638" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-05170" }, { "db": "VULHUB", "id": "VHN-401397" }, { "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "db": "NVD", "id": "CVE-2021-39996" }, { "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05170" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401397" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "date": "2022-01-10T14:10:20.823000", "db": "NVD", "id": "CVE-2021-39996" }, { "date": "2021-12-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-19T00:00:00", "db": "CNVD", "id": "CNVD-2022-05170" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401397" }, { "date": "2023-01-24T06:07:00", "db": "JVNDB", "id": "JVNDB-2021-017522" }, { "date": "2022-01-13T02:13:52.250000", "db": "NVD", "id": "CVE-2021-39996" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-214" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-214" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017522" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-214" } ], "trust": 0.6 } }
var-202207-0112
Vulnerability from variot
The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by abnormal function when the card is activated
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0112", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34741" } ] }, "cve": "CVE-2022-34741", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34741", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-427090", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34741", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34741", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-396", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-427090", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-34741", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation. Huawei of EMUI , HarmonyOS , Magic UI Exists in a classic buffer overflow vulnerability.Information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS, which is caused by abnormal function when the card is activated", "sources": [ { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34741", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013199", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-396", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52819", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427090", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34741", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "id": "VAR-202207-0112", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427090" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:34.914000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199745" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34741" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34741/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/120.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427090" }, { "db": "VULMON", "id": "CVE-2022-34741" }, { "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "db": "NVD", "id": "CVE-2022-34741" }, { "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427090" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34741" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "date": "2022-07-12T14:15:19.493000", "db": "NVD", "id": "CVE-2022-34741" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427090" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34741" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013199" }, { "date": "2022-07-19T14:10:47.477000", "db": "NVD", "id": "CVE-2022-34741" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-396" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-396" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013199" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-396" } ], "trust": 0.6 } }
var-202201-1018
Vulnerability from variot
There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity. Huawei EMUI , HarmonyOS , Magic UI Exists in a resource exhaustion vulnerability.Information may be tampered with. The Huawei Smartphone is a smartphone from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1018", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40011" } ] }, "cve": "CVE-2021-40011", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40011", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-03943", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401412", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40011", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40011", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-03943", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-566", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401412", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an uncontrolled resource consumption vulnerability in the display module. Successful exploitation of this vulnerability may affect integrity. Huawei EMUI , HarmonyOS , Magic UI Exists in a resource exhaustion vulnerability.Information may be tampered with. The Huawei Smartphone is a smartphone from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40011", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-002890", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-03943", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-566", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401412", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "id": "VAR-202201-1018", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" } ] }, "last_update_date": "2023-12-18T13:32:22.572000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0March\u00a02022", "trust": 0.8, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "title": "Patch for HuaWei smartphone denial of service vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/313801" }, { "title": "Huawei Smartphone Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178042" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-400", "trust": 1.1 }, { "problemtype": "Resource exhaustion (CWE-400) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40011" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-03943" }, { "db": "VULHUB", "id": "VHN-401412" }, { "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "db": "NVD", "id": "CVE-2021-40011" }, { "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-03943" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401412" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "date": "2022-01-10T14:10:21.407000", "db": "NVD", "id": "CVE-2021-40011" }, { "date": "2022-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-03943" }, { "date": "2022-04-25T00:00:00", "db": "VULHUB", "id": "VHN-401412" }, { "date": "2023-01-24T03:30:00", "db": "JVNDB", "id": "JVNDB-2022-002890" }, { "date": "2022-04-25T17:57:56.870000", "db": "NVD", "id": "CVE-2021-40011" }, { "date": "2022-04-26T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-566" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-566" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product resource exhaustion vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002890" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-566" } ], "trust": 0.6 } }
var-202110-1503
Vulnerability from variot
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1503", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "NVD", "id": "CVE-2021-22472" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22472" } ] }, "cve": "CVE-2021-22472", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22472", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380907", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22472", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22472", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2066", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380907", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22472", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380907" }, { "db": "VULMON", "id": "CVE-2021-22472" }, { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "NVD", "id": "CVE-2021-22472" }, { "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22472" }, { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "VULHUB", "id": "VHN-380907" }, { "db": "VULMON", "id": "CVE-2021-22472" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22472", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014322", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2066", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380907", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22472", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380907" }, { "db": "VULMON", "id": "CVE-2021-22472" }, { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "NVD", "id": "CVE-2021-22472" }, { "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "id": "VAR-202110-1503", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380907" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:18.798000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22472", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171553" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "NVD", "id": "CVE-2021-22472" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22472" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380907" }, { "db": "VULMON", "id": "CVE-2021-22472" }, { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "NVD", "id": "CVE-2021-22472" }, { "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380907" }, { "db": "VULMON", "id": "CVE-2021-22472" }, { "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "db": "NVD", "id": "CVE-2021-22472" }, { "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380907" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22472" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "date": "2021-10-28T13:15:09.747000", "db": "NVD", "id": "CVE-2021-22472" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380907" }, { "date": "2021-11-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22472" }, { "date": "2022-10-12T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-014322" }, { "date": "2021-11-02T00:14:49.863000", "db": "NVD", "id": "CVE-2021-22472" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2066" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2066" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014322" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2066" } ], "trust": 0.6 } }
var-202111-1586
Vulnerability from variot
There is an Identity verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Authentication vulnerabilities exist in Huawei Emui and Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1586", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "NVD", "id": "CVE-2021-37029" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37029" } ] }, "cve": "CVE-2021-37029", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37029", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398861", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37029", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37029", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202111-1893", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398861", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398861" }, { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "NVD", "id": "CVE-2021-37029" }, { "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Identity verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Authentication vulnerabilities exist in Huawei Emui and Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-37029" }, { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "VULHUB", "id": "VHN-398861" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37029", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015559", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1893", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102865", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398861", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398861" }, { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "NVD", "id": "CVE-2021-37029" }, { "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "id": "VAR-202111-1586", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398861" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:09.608000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172191" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "NVD", "id": "CVE-2021-37029" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37029" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398861" }, { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "NVD", "id": "CVE-2021-37029" }, { "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398861" }, { "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "db": "NVD", "id": "CVE-2021-37029" }, { "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398861" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "date": "2021-11-23T16:15:09.667000", "db": "NVD", "id": "CVE-2021-37029" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398861" }, { "date": "2022-11-24T06:43:00", "db": "JVNDB", "id": "JVNDB-2021-015559" }, { "date": "2021-12-09T17:57:49.587000", "db": "NVD", "id": "CVE-2021-37029" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1893" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1893" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015559" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1893" } ], "trust": 0.6 } }
var-202101-1001
Vulnerability from variot
There is a improper privilege management vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability can cause information disclosure and malfunctions due to insufficient verification of data authenticity. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1001", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "NVD", "id": "CVE-2020-9141" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9141" } ] }, "cve": "CVE-2020-9141", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9141", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-187266", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9141", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9141", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202101-1100", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-187266", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187266" }, { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "NVD", "id": "CVE-2020-9141" }, { "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a improper privilege management vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability can cause information disclosure and malfunctions due to insufficient verification of data authenticity. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company", "sources": [ { "db": "NVD", "id": "CVE-2020-9141" }, { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "VULHUB", "id": "VHN-187266" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9141", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015407", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1100", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-187266", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187266" }, { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "NVD", "id": "CVE-2020-9141" }, { "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "id": "VAR-202101-1001", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187266" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:46.423000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Repair measures for Huawei smartphone authorization bugs", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139460" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-269", "trust": 1.1 }, { "problemtype": "CWE-345", "trust": 1.1 }, { "problemtype": "Improper authority management (CWE-269) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": " Inadequate verification of data reliability (CWE-345) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187266" }, { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "NVD", "id": "CVE-2020-9141" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9141" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187266" }, { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "NVD", "id": "CVE-2020-9141" }, { "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187266" }, { "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "db": "NVD", "id": "CVE-2020-9141" }, { "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187266" }, { "date": "2021-09-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "date": "2021-01-13T22:15:14.083000", "db": "NVD", "id": "CVE-2020-9141" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-21T00:00:00", "db": "VULHUB", "id": "VHN-187266" }, { "date": "2021-09-21T09:03:00", "db": "JVNDB", "id": "JVNDB-2020-015407" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2020-9141" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1100" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1100" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Insufficient verification vulnerability in data reliability on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015407" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1100" } ], "trust": 0.6 } }
var-202108-2208
Vulnerability from variot
There is an Improper Check for Unusual or Exceptional Conditions Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei EMUI/Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2208", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22447" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22447" } ] }, "cve": "CVE-2021-22447", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380882", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22447", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22447", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-133", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380882", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22447", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380882" }, { "db": "VULMON", "id": "CVE-2021-22447" }, { "db": "NVD", "id": "CVE-2021-22447" }, { "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Check for Unusual or Exceptional Conditions Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei EMUI/Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-22447" }, { "db": "VULHUB", "id": "VHN-380882" }, { "db": "VULMON", "id": "CVE-2021-22447" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22447", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-133", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380882", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22447", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380882" }, { "db": "VULMON", "id": "CVE-2021-22447" }, { "db": "NVD", "id": "CVE-2021-22447" }, { "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "id": "VAR-202108-2208", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380882" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:47:01.603000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159194" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-754", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380882" }, { "db": "NVD", "id": "CVE-2021-22447" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22447" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/754.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380882" }, { "db": "VULMON", "id": "CVE-2021-22447" }, { "db": "NVD", "id": "CVE-2021-22447" }, { "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380882" }, { "db": "VULMON", "id": "CVE-2021-22447" }, { "db": "NVD", "id": "CVE-2021-22447" }, { "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380882" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22447" }, { "date": "2021-08-02T18:15:08.643000", "db": "NVD", "id": "CVE-2021-22447" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380882" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22447" }, { "date": "2021-12-09T17:57:50", "db": "NVD", "id": "CVE-2021-22447" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-133" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-133" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Code problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-133" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-133" } ], "trust": 0.6 } }
var-202112-0135
Vulnerability from variot
There is a Memory leak vulnerability with the codec detection module in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart due to memory exhaustion. Huawei A vulnerability related to lack of freeing memory after expiration exists in smartphone products.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0135", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "NVD", "id": "CVE-2021-37046" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37046" } ] }, "cve": "CVE-2021-37046", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37046", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398879", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37046", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37046", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202112-463", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398879", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398879" }, { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "NVD", "id": "CVE-2021-37046" }, { "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory leak vulnerability with the codec detection module in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart due to memory exhaustion. Huawei A vulnerability related to lack of freeing memory after expiration exists in smartphone products.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37046" }, { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "VULHUB", "id": "VHN-398879" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37046", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015793", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-463", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398879", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398879" }, { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "NVD", "id": "CVE-2021-37046" }, { "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "id": "VAR-202112-0135", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398879" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:05.363000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173135" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398879" }, { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "NVD", "id": "CVE-2021-37046" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37046" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398879" }, { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "NVD", "id": "CVE-2021-37046" }, { "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398879" }, { "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "db": "NVD", "id": "CVE-2021-37046" }, { "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398879" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "date": "2021-12-07T16:15:07.497000", "db": "NVD", "id": "CVE-2021-37046" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398879" }, { "date": "2022-11-30T04:57:00", "db": "JVNDB", "id": "JVNDB-2021-015793" }, { "date": "2021-12-07T19:43:55.347000", "db": "NVD", "id": "CVE-2021-37046" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-463" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-463" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to lack of memory release after expiration in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015793" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-463" } ], "trust": 0.6 } }
var-202107-1680
Vulnerability from variot
There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1680", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22430" } ] }, "cve": "CVE-2021-22430", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22430", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380865", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22430", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22430", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2225", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380865", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "VULHUB", "id": "VHN-380865" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22430", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018745", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2225", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380865", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "id": "VAR-202107-1680", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380865" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:09.853000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171998" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-94", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22430" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22430/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380865" }, { "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "db": "NVD", "id": "CVE-2021-22430" }, { "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380865" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "date": "2022-02-25T19:15:09.610000", "db": "NVD", "id": "CVE-2021-22430" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380865" }, { "date": "2023-07-06T01:50:00", "db": "JVNDB", "id": "JVNDB-2021-018745" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22430" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2225" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2225" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018745" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2225" } ], "trust": 0.6 } }
var-202202-1525
Vulnerability from variot
There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service integrity. HUAWEI EMUI and Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1525", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "NVD", "id": "CVE-2021-37027" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37027" } ] }, "cve": "CVE-2021-37027", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37027", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398860", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37027", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37027", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202202-2069", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398860", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398860" }, { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "NVD", "id": "CVE-2021-37027" }, { "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service integrity. HUAWEI EMUI and Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37027" }, { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "VULHUB", "id": "VHN-398860" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37027", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-007119", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-2069", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398860", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398860" }, { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "NVD", "id": "CVE-2021-37027" }, { "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "id": "VAR-202202-1525", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398860" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:51.559000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185294" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "NVD", "id": "CVE-2021-37027" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37027" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-37027/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398860" }, { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "NVD", "id": "CVE-2021-37027" }, { "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398860" }, { "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "db": "NVD", "id": "CVE-2021-37027" }, { "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-398860" }, { "date": "2023-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "date": "2022-02-25T19:15:11.727000", "db": "NVD", "id": "CVE-2021-37027" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-08T00:00:00", "db": "VULHUB", "id": "VHN-398860" }, { "date": "2023-07-12T06:52:00", "db": "JVNDB", "id": "JVNDB-2022-007119" }, { "date": "2022-03-08T13:55:49.213000", "db": "NVD", "id": "CVE-2021-37027" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2069" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2069" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI\u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007119" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2069" } ], "trust": 0.6 } }
var-202101-1945
Vulnerability from variot
There is a heap overflow vulnerability in some Huawei smartphone, attackers can exploit this vulnerability to cause heap overflows due to improper restriction of operations within the bounds of a memory buffer. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1945", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "NVD", "id": "CVE-2020-9144" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9144" } ] }, "cve": "CVE-2020-9144", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9144", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-187269", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9144", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9144", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202101-1049", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-187269", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187269" }, { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "NVD", "id": "CVE-2020-9144" }, { "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap overflow vulnerability in some Huawei smartphone, attackers can exploit this vulnerability to cause heap overflows due to improper restriction of operations within the bounds of a memory buffer. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company", "sources": [ { "db": "NVD", "id": "CVE-2020-9144" }, { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "VULHUB", "id": "VHN-187269" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9144", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015438", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1049", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-52826", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-187269", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187269" }, { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "NVD", "id": "CVE-2020-9144" }, { "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "id": "VAR-202101-1945", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187269" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:17.613000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Huawei Emui and Honor Magic Ui Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139436" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187269" }, { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "NVD", "id": "CVE-2020-9144" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9144" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187269" }, { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "NVD", "id": "CVE-2020-9144" }, { "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187269" }, { "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "db": "NVD", "id": "CVE-2020-9144" }, { "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187269" }, { "date": "2021-09-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "date": "2021-01-13T19:15:17.057000", "db": "NVD", "id": "CVE-2020-9144" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-187269" }, { "date": "2021-09-22T09:11:00", "db": "JVNDB", "id": "JVNDB-2020-015438" }, { "date": "2021-12-09T17:57:49.813000", "db": "NVD", "id": "CVE-2020-9144" }, { "date": "2021-07-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1049" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1049" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability regarding out-of-bounds writing on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015438" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1049" } ], "trust": 0.6 } }
var-202108-2211
Vulnerability from variot
There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause code injection. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2211", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22444" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22444" } ] }, "cve": "CVE-2021-22444", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380879", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22444", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22444", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-127", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380879", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22444", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380879" }, { "db": "VULMON", "id": "CVE-2021-22444" }, { "db": "NVD", "id": "CVE-2021-22444" }, { "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause code injection. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-22444" }, { "db": "VULHUB", "id": "VHN-380879" }, { "db": "VULMON", "id": "CVE-2021-22444" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22444", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-127", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380879", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22444", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380879" }, { "db": "VULMON", "id": "CVE-2021-22444" }, { "db": "NVD", "id": "CVE-2021-22444" }, { "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "id": "VAR-202108-2211", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380879" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:06.555000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159081" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380879" }, { "db": "NVD", "id": "CVE-2021-22444" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22444" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380879" }, { "db": "VULMON", "id": "CVE-2021-22444" }, { "db": "NVD", "id": "CVE-2021-22444" }, { "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380879" }, { "db": "VULMON", "id": "CVE-2021-22444" }, { "db": "NVD", "id": "CVE-2021-22444" }, { "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380879" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22444" }, { "date": "2021-08-02T17:15:14.660000", "db": "NVD", "id": "CVE-2021-22444" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380879" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22444" }, { "date": "2021-12-09T17:55:11.043000", "db": "NVD", "id": "CVE-2021-22444" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-127" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-127" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-127" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-127" } ], "trust": 0.6 } }
var-202108-2212
Vulnerability from variot
There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random address access. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei Smartphone
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2212", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22443" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22443" } ] }, "cve": "CVE-2021-22443", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380878", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22443", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22443", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-125", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380878", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22443", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380878" }, { "db": "VULMON", "id": "CVE-2021-22443" }, { "db": "NVD", "id": "CVE-2021-22443" }, { "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random address access. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei Smartphone", "sources": [ { "db": "NVD", "id": "CVE-2021-22443" }, { "db": "VULHUB", "id": "VHN-380878" }, { "db": "VULMON", "id": "CVE-2021-22443" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22443", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-125", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380878", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22443", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380878" }, { "db": "VULMON", "id": "CVE-2021-22443" }, { "db": "NVD", "id": "CVE-2021-22443" }, { "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "id": "VAR-202108-2212", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380878" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:44.456000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159079" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380878" }, { "db": "NVD", "id": "CVE-2021-22443" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22443" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380878" }, { "db": "VULMON", "id": "CVE-2021-22443" }, { "db": "NVD", "id": "CVE-2021-22443" }, { "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380878" }, { "db": "VULMON", "id": "CVE-2021-22443" }, { "db": "NVD", "id": "CVE-2021-22443" }, { "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380878" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22443" }, { "date": "2021-08-02T17:15:14.613000", "db": "NVD", "id": "CVE-2021-22443" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380878" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22443" }, { "date": "2021-12-09T17:55:11.037000", "db": "NVD", "id": "CVE-2021-22443" }, { "date": "2022-03-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-125" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-125" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-125" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-125" } ], "trust": 0.6 } }
var-202108-2200
Vulnerability from variot
There is an Incomplete Cleanup Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have security flaws
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2200", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22428" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22428" } ] }, "cve": "CVE-2021-22428", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-380863", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-22428", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22428", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-120", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380863", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22428", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380863" }, { "db": "VULMON", "id": "CVE-2021-22428" }, { "db": "NVD", "id": "CVE-2021-22428" }, { "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Incomplete Cleanup Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have security flaws", "sources": [ { "db": "NVD", "id": "CVE-2021-22428" }, { "db": "VULHUB", "id": "VHN-380863" }, { "db": "VULMON", "id": "CVE-2021-22428" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22428", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-120", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380863", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22428", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380863" }, { "db": "VULMON", "id": "CVE-2021-22428" }, { "db": "NVD", "id": "CVE-2021-22428" }, { "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "id": "VAR-202108-2200", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380863" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:25.152000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159191" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "CWE-459", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380863" }, { "db": "NVD", "id": "CVE-2021-22428" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22428" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/362.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/459.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380863" }, { "db": "VULMON", "id": "CVE-2021-22428" }, { "db": "NVD", "id": "CVE-2021-22428" }, { "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380863" }, { "db": "VULMON", "id": "CVE-2021-22428" }, { "db": "NVD", "id": "CVE-2021-22428" }, { "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380863" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22428" }, { "date": "2021-08-02T17:15:14.440000", "db": "NVD", "id": "CVE-2021-22428" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380863" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22428" }, { "date": "2021-12-09T17:55:10.190000", "db": "NVD", "id": "CVE-2021-22428" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-120" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-120" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-120" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-120" } ], "trust": 0.6 } }
var-202203-0264
Vulnerability from variot
There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0264", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "NVD", "id": "CVE-2021-40056" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40056" } ] }, "cve": "CVE-2021-40056", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40056", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401457", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40056", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40056", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-980", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401457", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401457" }, { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "NVD", "id": "CVE-2021-40056" }, { "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40056" }, { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "VULHUB", "id": "VHN-401457" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40056", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018708", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-980", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401457", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401457" }, { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "NVD", "id": "CVE-2021-40056" }, { "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "id": "VAR-202203-0264", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401457" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:33.619000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186009" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401457" }, { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "NVD", "id": "CVE-2021-40056" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40056" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40056/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401457" }, { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "NVD", "id": "CVE-2021-40056" }, { "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401457" }, { "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "db": "NVD", "id": "CVE-2021-40056" }, { "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401457" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "date": "2022-03-10T17:43:21.363000", "db": "NVD", "id": "CVE-2021-40056" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401457" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018708" }, { "date": "2022-03-14T15:54:15.660000", "db": "NVD", "id": "CVE-2021-40056" }, { "date": "2022-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-980" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-980" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Classic buffer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018708" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-980" } ], "trust": 0.6 } }
var-202107-0367
Vulnerability from variot
There is a Configuration Defect vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22343" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22343" } ] }, "cve": "CVE-2021-22343", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380778", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22343", "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22343", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-033", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380778", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22343", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380778" }, { "db": "VULMON", "id": "CVE-2021-22343" }, { "db": "NVD", "id": "CVE-2021-22343" }, { "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration Defect vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-22343" }, { "db": "VULHUB", "id": "VHN-380778" }, { "db": "VULMON", "id": "CVE-2021-22343" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22343", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202107-033", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380778", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22343", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380778" }, { "db": "VULMON", "id": "CVE-2021-22343" }, { "db": "NVD", "id": "CVE-2021-22343" }, { "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "id": "VAR-202107-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380778" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:31.075000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Fixes for configuration error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156102" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22343" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380778" }, { "db": "VULMON", "id": "CVE-2021-22343" }, { "db": "NVD", "id": "CVE-2021-22343" }, { "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380778" }, { "db": "VULMON", "id": "CVE-2021-22343" }, { "db": "NVD", "id": "CVE-2021-22343" }, { "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-01T00:00:00", "db": "VULHUB", "id": "VHN-380778" }, { "date": "2021-07-01T00:00:00", "db": "VULMON", "id": "CVE-2021-22343" }, { "date": "2021-07-01T12:15:07.517000", "db": "NVD", "id": "CVE-2021-22343" }, { "date": "2021-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380778" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22343" }, { "date": "2021-07-06T20:52:15.340000", "db": "NVD", "id": "CVE-2021-22343" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-033" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Configuration error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-033" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "configuration error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-033" } ], "trust": 0.6 } }
var-202209-1060
Vulnerability from variot
Out-of-bounds heap read vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds access. Huawei of EMUI and Magic UI Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1060", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "NVD", "id": "CVE-2021-40019" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40019" } ] }, "cve": "CVE-2021-40019", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40019", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40019", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-1304", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "NVD", "id": "CVE-2021-40019" }, { "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out-of-bounds heap read vulnerability in the HW_KEYMASTER module. Successful exploitation of this vulnerability may cause out-of-bounds access. Huawei of EMUI and Magic UI Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40019" }, { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "VULHUB", "id": "VHN-401420" }, { "db": "VULMON", "id": "CVE-2021-40019" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40019", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-020316", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1304", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401420", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40019", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401420" }, { "db": "VULMON", "id": "CVE-2021-40019" }, { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "NVD", "id": "CVE-2021-40019" }, { "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "id": "VAR-202209-1060", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401420" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:41.533000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI and Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=210488" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401420" }, { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "NVD", "id": "CVE-2021-40019" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40019" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40019/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401420" }, { "db": "VULMON", "id": "CVE-2021-40019" }, { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "NVD", "id": "CVE-2021-40019" }, { "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401420" }, { "db": "VULMON", "id": "CVE-2021-40019" }, { "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "db": "NVD", "id": "CVE-2021-40019" }, { "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-401420" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40019" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "date": "2022-09-16T18:15:11.497000", "db": "NVD", "id": "CVE-2021-40019" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-401420" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40019" }, { "date": "2023-10-11T08:55:00", "db": "JVNDB", "id": "JVNDB-2021-020316" }, { "date": "2022-09-20T17:59:46.090000", "db": "NVD", "id": "CVE-2021-40019" }, { "date": "2022-10-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1304" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1304" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020316" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1304" } ], "trust": 0.6 } }
var-202206-0865
Vulnerability from variot
Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI contains a vulnerability related to the deletion of sensitive information prior to storage or transmission.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is a security vulnerability in HUAWEI EMUI. The following products and versions are affected: EMUI 11.0.0, Magic UI 4.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0865", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "NVD", "id": "CVE-2021-46813" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46813" } ] }, "cve": "CVE-2021-46813", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46813", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423546", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46813", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46813", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-1179", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423546", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423546" }, { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "NVD", "id": "CVE-2021-46813" }, { "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI contains a vulnerability related to the deletion of sensitive information prior to storage or transmission.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is a security vulnerability in HUAWEI EMUI. The following products and versions are affected: EMUI 11.0.0, Magic UI 4.0.0", "sources": [ { "db": "NVD", "id": "CVE-2021-46813" }, { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "VULHUB", "id": "VHN-423546" }, { "db": "VULMON", "id": "CVE-2021-46813" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46813", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012100", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-1179", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51603", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423546", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46813", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423546" }, { "db": "VULMON", "id": "CVE-2021-46813" }, { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "NVD", "id": "CVE-2021-46813" }, { "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "id": "VAR-202206-0865", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423546" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:53.537000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=198092" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-212", "trust": 1.1 }, { "problemtype": "Improper removal of important information prior to storage or transfer (CWE-212) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423546" }, { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "NVD", "id": "CVE-2021-46813" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46813" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46813/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423546" }, { "db": "VULMON", "id": "CVE-2021-46813" }, { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "NVD", "id": "CVE-2021-46813" }, { "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423546" }, { "db": "VULMON", "id": "CVE-2021-46813" }, { "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "db": "NVD", "id": "CVE-2021-46813" }, { "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423546" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46813" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "date": "2022-06-13T16:15:08.190000", "db": "NVD", "id": "CVE-2021-46813" }, { "date": "2022-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423546" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46813" }, { "date": "2023-08-25T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-012100" }, { "date": "2022-06-27T16:11:26.213000", "db": "NVD", "id": "CVE-2021-46813" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1179" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1179" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability related to deletion of sensitive information before storage or transfer in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012100" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1179" } ], "trust": 0.6 } }
var-202111-1590
Vulnerability from variot
There is an Unstandardized field names in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Huawei Emui and Magic UI have information disclosure vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1590", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "NVD", "id": "CVE-2021-37034" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37034" } ] }, "cve": "CVE-2021-37034", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37034", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398867", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37034", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37034", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1899", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398867", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398867" }, { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "NVD", "id": "CVE-2021-37034" }, { "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unstandardized field names in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. Huawei Emui and Magic UI have information disclosure vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37034" }, { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "VULHUB", "id": "VHN-398867" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37034", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015512", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1899", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102860", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398867", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398867" }, { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "NVD", "id": "CVE-2021-37034" }, { "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "id": "VAR-202111-1590", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398867" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:41.641000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172196" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "NVD", "id": "CVE-2021-37034" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37034" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398867" }, { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "NVD", "id": "CVE-2021-37034" }, { "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398867" }, { "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "db": "NVD", "id": "CVE-2021-37034" }, { "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398867" }, { "date": "2022-11-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "date": "2021-11-23T16:15:09.880000", "db": "NVD", "id": "CVE-2021-37034" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398867" }, { "date": "2022-11-22T09:12:00", "db": "JVNDB", "id": "JVNDB-2021-015512" }, { "date": "2021-12-09T17:57:50.037000", "db": "NVD", "id": "CVE-2021-37034" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1899" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1899" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015512" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1899" } ], "trust": 0.6 } }
var-202112-0346
Vulnerability from variot
There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an authentication vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0346", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37054" } ] }, "cve": "CVE-2021-37054", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37054", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398887", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37054", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37054", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2017", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398887", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an authentication vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "VULHUB", "id": "VHN-398887" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37054", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015862", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2017", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398887", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "id": "VAR-202112-0346", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398887" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:24.958000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Identity\u00a0spoofing\u00a0and\u00a0authentication\u00a0bypass\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173785" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37054" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398887" }, { "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "db": "NVD", "id": "CVE-2021-37054" }, { "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398887" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "date": "2021-12-08T15:15:09.700000", "db": "NVD", "id": "CVE-2021-37054" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398887" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015862" }, { "date": "2021-12-09T17:52:37.077000", "db": "NVD", "id": "CVE-2021-37054" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2017" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2017" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Authentication Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015862" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2017" } ], "trust": 0.6 } }
var-202204-1111
Vulnerability from variot
The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a privilege escalation vulnerability in the Huawei HarmonyOS WIFI module. The vulnerability stems from an erroneous program calling a high-level native procedure. An attacker could exploit this vulnerability for privilege escalation
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1111", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22258" } ] }, "cve": "CVE-2022-22258", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-22258", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-409787", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22258", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22258", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202204-2033", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-409787", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-22258", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Wi-Fi module has an event notification vulnerability.Successful exploitation of this vulnerability may allow third-party applications to intercept event notifications and add information and result in elevation-of-privilege. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a privilege escalation vulnerability in the Huawei HarmonyOS WIFI module. The vulnerability stems from an erroneous program calling a high-level native procedure. An attacker could exploit this vulnerability for privilege escalation", "sources": [ { "db": "NVD", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22258", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007942", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2033", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44621", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409787", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22258", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "id": "VAR-202204-1111", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409787" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:54:54.555000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189781" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22258" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22258/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409787" }, { "db": "VULMON", "id": "CVE-2022-22258" }, { "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "db": "NVD", "id": "CVE-2022-22258" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409787" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22258" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "date": "2022-04-11T20:15:19.747000", "db": "NVD", "id": "CVE-2022-22258" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-30T00:00:00", "db": "VULHUB", "id": "VHN-409787" }, { "date": "2022-09-30T00:00:00", "db": "VULMON", "id": "CVE-2022-22258" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007942" }, { "date": "2022-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2033" }, { "date": "2022-09-30T13:10:13.337000", "db": "NVD", "id": "CVE-2022-22258" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007942" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2033" } ], "trust": 0.6 } }
var-202112-0133
Vulnerability from variot
There is a Logic bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0133", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "NVD", "id": "CVE-2021-37055" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37055" } ] }, "cve": "CVE-2021-37055", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37055", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398888", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37055", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37055", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-459", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398888", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398888" }, { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "NVD", "id": "CVE-2021-37055" }, { "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Logic bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information. Huawei Smartphone products have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37055" }, { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "VULHUB", "id": "VHN-398888" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37055", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015784", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-459", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398888", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398888" }, { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "NVD", "id": "CVE-2021-37055" }, { "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "id": "VAR-202112-0133", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398888" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:21.950000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Repair measures to handle logic errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173131" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "NVD", "id": "CVE-2021-37055" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37055" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398888" }, { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "NVD", "id": "CVE-2021-37055" }, { "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398888" }, { "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "db": "NVD", "id": "CVE-2021-37055" }, { "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398888" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "date": "2021-12-07T16:15:07.577000", "db": "NVD", "id": "CVE-2021-37055" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398888" }, { "date": "2022-11-30T03:20:00", "db": "JVNDB", "id": "JVNDB-2021-015784" }, { "date": "2021-12-07T19:51:15.630000", "db": "NVD", "id": "CVE-2021-37055" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-459" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-459" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015784" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "handling logic errors", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-459" } ], "trust": 0.6 } }
var-202111-1769
Vulnerability from variot
There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1769", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39974" } ] }, "cve": "CVE-2021-39974", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39974", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401375", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39974", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39974", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2131", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401375", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39974", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017604", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2131", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401375", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39974", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "id": "VAR-202111-1769", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401375" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:59.087000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176792" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39974" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401375" }, { "db": "VULMON", "id": "CVE-2021-39974" }, { "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "db": "NVD", "id": "CVE-2021-39974" }, { "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401375" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39974" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "date": "2022-01-03T22:15:10.333000", "db": "NVD", "id": "CVE-2021-39974" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401375" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-39974" }, { "date": "2023-01-27T06:55:00", "db": "JVNDB", "id": "JVNDB-2021-017604" }, { "date": "2022-01-13T15:52:46.770000", "db": "NVD", "id": "CVE-2021-39974" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2131" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2131" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017604" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2131" } ], "trust": 0.6 } }
var-202203-0974
Vulnerability from variot
There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0974", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "NVD", "id": "CVE-2021-40060" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40060" } ] }, "cve": "CVE-2021-40060", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40060", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401461", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40060", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40060", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-975", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401461", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401461" }, { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "NVD", "id": "CVE-2021-40060" }, { "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40060" }, { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "VULHUB", "id": "VHN-401461" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40060", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018704", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-975", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401461", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401461" }, { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "NVD", "id": "CVE-2021-40060" }, { "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "id": "VAR-202203-0974", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401461" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:49.379000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186007" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401461" }, { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "NVD", "id": "CVE-2021-40060" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40060" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40060/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401461" }, { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "NVD", "id": "CVE-2021-40060" }, { "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401461" }, { "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "db": "NVD", "id": "CVE-2021-40060" }, { "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401461" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "date": "2022-03-10T17:43:23.250000", "db": "NVD", "id": "CVE-2021-40060" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401461" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018704" }, { "date": "2022-03-14T16:16:45.387000", "db": "NVD", "id": "CVE-2021-40060" }, { "date": "2022-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-975" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-975" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018704" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-975" } ], "trust": 0.6 } }
var-202112-0349
Vulnerability from variot
There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0349", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37051" } ] }, "cve": "CVE-2021-37051", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37051", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398884", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37051", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37051", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2019", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398884", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access. plural Huawei Smartphone products contain an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "VULHUB", "id": "VHN-398884" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37051", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015859", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2019", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398884", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "id": "VAR-202112-0349", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398884" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:47.199000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Out-of-bounds\u00a0read\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173787" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 1.6, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37051" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398884" }, { "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "db": "NVD", "id": "CVE-2021-37051" }, { "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398884" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "date": "2021-12-08T15:15:09.533000", "db": "NVD", "id": "CVE-2021-37051" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398884" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015859" }, { "date": "2021-12-09T17:51:12.040000", "db": "NVD", "id": "CVE-2021-37051" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2019" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2019" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds reading vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015859" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2019" } ], "trust": 0.6 } }
var-202206-0260
Vulnerability from variot
The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0260", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31758" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31758" } ] }, "cve": "CVE-2022-31758", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "VHN-423591", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.4, "id": "CVE-2022-31758", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "LOW", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.0, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31758", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-479", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423591", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31758", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31758", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202206-479", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66182", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423591", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31758", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "id": "VAR-202206-0260", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423591" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:52.481000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196950" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "NVD", "id": "CVE-2022-31758" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31758/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/362.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423591" }, { "db": "VULMON", "id": "CVE-2022-31758" }, { "db": "NVD", "id": "CVE-2022-31758" }, { "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423591" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31758" }, { "date": "2022-06-13T15:15:10.227000", "db": "NVD", "id": "CVE-2022-31758" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-21T00:00:00", "db": "VULHUB", "id": "VHN-423591" }, { "date": "2022-06-21T00:00:00", "db": "VULMON", "id": "CVE-2022-31758" }, { "date": "2022-06-21T18:08:15.080000", "db": "NVD", "id": "CVE-2022-31758" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-479" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI HarmonyOS Competitive conditional vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-479" } ], "trust": 0.6 } }
var-202107-1682
Vulnerability from variot
There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1682", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22433" } ] }, "cve": "CVE-2021-22433", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22433", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380868", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22433", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22433", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2223", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380868", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "VULHUB", "id": "VHN-380868" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22433", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018742", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2223", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380868", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "id": "VAR-202107-1682", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380868" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:15.821000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171989" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22433" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22433/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380868" }, { "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "db": "NVD", "id": "CVE-2021-22433" }, { "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380868" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "date": "2022-02-25T19:15:10.157000", "db": "NVD", "id": "CVE-2021-22433" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380868" }, { "date": "2023-07-06T01:41:00", "db": "JVNDB", "id": "JVNDB-2021-018742" }, { "date": "2022-03-07T17:58:49.180000", "db": "NVD", "id": "CVE-2021-22433" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2223" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2223" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018742" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2223" } ], "trust": 0.6 } }
var-202110-1492
Vulnerability from variot
There is a Permission verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect the device performance. Huawei Smartphones have an authentication vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1492", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "NVD", "id": "CVE-2021-22490" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22490" } ] }, "cve": "CVE-2021-22490", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22490", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380925", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22490", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22490", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2080", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380925", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380925" }, { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "NVD", "id": "CVE-2021-22490" }, { "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permission verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect the device performance. Huawei Smartphones have an authentication vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22490" }, { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "VULHUB", "id": "VHN-380925" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22490", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014311", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2080", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380925", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380925" }, { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "NVD", "id": "CVE-2021-22490" }, { "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "id": "VAR-202110-1492", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380925" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:25.226000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22490", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168219" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380925" }, { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "NVD", "id": "CVE-2021-22490" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22490" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380925" }, { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "NVD", "id": "CVE-2021-22490" }, { "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380925" }, { "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "db": "NVD", "id": "CVE-2021-22490" }, { "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380925" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "date": "2021-10-28T13:15:10.267000", "db": "NVD", "id": "CVE-2021-22490" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-380925" }, { "date": "2022-10-12T08:32:00", "db": "JVNDB", "id": "JVNDB-2021-014311" }, { "date": "2021-11-01T23:26:05.507000", "db": "NVD", "id": "CVE-2021-22490" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2080" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2080" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Authentication Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014311" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2080" } ], "trust": 0.6 } }
var-202205-1066
Vulnerability from variot
Third-party pop-up window coverage vulnerability in the iConnect module.Successful exploitation of this vulnerability may cause system pop-up window may be covered to mislead users to perform incorrect operations. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI EMUI is a mobile operating system developed based on Android. There is a security vulnerability in HUAWEI EMUI/Magic UI, which is caused by a third-party pop-up overlay vulnerability in the iConnect module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-1066", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "NVD", "id": "CVE-2021-46788" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46788" } ] }, "cve": "CVE-2021-46788", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46788", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-419300", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46788", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46788", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-3331", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-419300", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46788", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419300" }, { "db": "VULMON", "id": "CVE-2021-46788" }, { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "NVD", "id": "CVE-2021-46788" }, { "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Third-party pop-up window coverage vulnerability in the iConnect module.Successful exploitation of this vulnerability may cause system pop-up window may be covered to mislead users to perform incorrect operations. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Information may be tampered with. HUAWEI EMUI is a mobile operating system developed based on Android. There is a security vulnerability in HUAWEI EMUI/Magic UI, which is caused by a third-party pop-up overlay vulnerability in the iConnect module", "sources": [ { "db": "NVD", "id": "CVE-2021-46788" }, { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "VULHUB", "id": "VHN-419300" }, { "db": "VULMON", "id": "CVE-2021-46788" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46788", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009692", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-3331", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-43213", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-419300", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46788", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419300" }, { "db": "VULMON", "id": "CVE-2021-46788" }, { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "NVD", "id": "CVE-2021-46788" }, { "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "id": "VAR-202205-1066", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419300" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:08.958000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193837" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "NVD", "id": "CVE-2021-46788" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46788" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46788/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419300" }, { "db": "VULMON", "id": "CVE-2021-46788" }, { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "NVD", "id": "CVE-2021-46788" }, { "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419300" }, { "db": "VULMON", "id": "CVE-2021-46788" }, { "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "db": "NVD", "id": "CVE-2021-46788" }, { "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419300" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46788" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "date": "2022-05-13T15:15:08.570000", "db": "NVD", "id": "CVE-2021-46788" }, { "date": "2022-05-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-419300" }, { "date": "2022-05-23T00:00:00", "db": "VULMON", "id": "CVE-2021-46788" }, { "date": "2023-08-07T08:15:00", "db": "JVNDB", "id": "JVNDB-2022-009692" }, { "date": "2022-05-23T18:46:39.300000", "db": "NVD", "id": "CVE-2021-46788" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3331" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3331" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009692" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3331" } ], "trust": 0.6 } }
var-202209-1322
Vulnerability from variot
Out-of-bounds write vulnerability in the kernel modules. Successful exploitation of this vulnerability may cause a panic reboot. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1322", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "NVD", "id": "CVE-2020-36601" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-36601" } ] }, "cve": "CVE-2020-36601", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-36601", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-36601", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-1305", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "NVD", "id": "CVE-2020-36601" }, { "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Out-of-bounds write vulnerability in the kernel modules. Successful exploitation of this vulnerability may cause a panic reboot. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2020-36601" }, { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "VULHUB", "id": "VHN-430127" }, { "db": "VULMON", "id": "CVE-2020-36601" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-36601", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017277", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1305", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-430127", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-36601", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430127" }, { "db": "VULMON", "id": "CVE-2020-36601" }, { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "NVD", "id": "CVE-2020-36601" }, { "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "id": "VAR-202209-1322", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-430127" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:36.596000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI and Huawei Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208465" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-430127" }, { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "NVD", "id": "CVE-2020-36601" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36601" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2020-36601/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-430127" }, { "db": "VULMON", "id": "CVE-2020-36601" }, { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "NVD", "id": "CVE-2020-36601" }, { "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-430127" }, { "db": "VULMON", "id": "CVE-2020-36601" }, { "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "db": "NVD", "id": "CVE-2020-36601" }, { "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-430127" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2020-36601" }, { "date": "2023-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "date": "2022-09-16T18:15:11.407000", "db": "NVD", "id": "CVE-2020-36601" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-20T00:00:00", "db": "VULHUB", "id": "VHN-430127" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2020-36601" }, { "date": "2023-10-11T08:56:00", "db": "JVNDB", "id": "JVNDB-2022-017277" }, { "date": "2022-09-20T18:18:41.903000", "db": "NVD", "id": "CVE-2020-36601" }, { "date": "2022-09-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1305" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1305" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017277" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1305" } ], "trust": 0.6 } }
var-202209-0306
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0306", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38992" } ] }, "cve": "CVE-2022-38992", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38992", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38992", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-181", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS, which is caused by a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "VULHUB", "id": "VHN-428511" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38992", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016787", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-181", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428511", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428511" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "id": "VAR-202209-0306", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428511" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:44.523000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208085" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38992" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38992/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428511" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428511" }, { "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "db": "NVD", "id": "CVE-2022-38992" }, { "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428511" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "date": "2022-09-16T18:15:17.630000", "db": "NVD", "id": "CVE-2022-38992" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428511" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016787" }, { "date": "2022-09-17T03:46:53.047000", "db": "NVD", "id": "CVE-2022-38992" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-181" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-181" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016787" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-181" } ], "trust": 0.6 } }
var-202107-1681
Vulnerability from variot
There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1681", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22431" } ] }, "cve": "CVE-2021-22431", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22431", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380866", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22431", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22431", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202107-2224", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380866", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22431", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI , HarmonyOS , Magic UI Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22431", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018744", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202107-2224", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380866", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22431", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "id": "VAR-202107-1681", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380866" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:49.751000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HarmonyOS\u00a0Security\u00a0Bulletins\u00a0for\u00a0Huawei\u00a0Phones\u00a0and\u00a0Tablets\u00a0-\u00a0July\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171993" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22431" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22431/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380866" }, { "db": "VULMON", "id": "CVE-2021-22431" }, { "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "db": "NVD", "id": "CVE-2021-22431" }, { "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380866" }, { "date": "2022-02-25T00:00:00", "db": "VULMON", "id": "CVE-2021-22431" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "date": "2022-02-25T19:15:09.833000", "db": "NVD", "id": "CVE-2021-22431" }, { "date": "2021-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380866" }, { "date": "2022-03-07T00:00:00", "db": "VULMON", "id": "CVE-2021-22431" }, { "date": "2023-07-06T01:45:00", "db": "JVNDB", "id": "JVNDB-2021-018744" }, { "date": "2022-03-07T17:57:53.880000", "db": "NVD", "id": "CVE-2021-22431" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-2224" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2224" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018744" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-2224" } ], "trust": 0.6 } }
var-202108-2202
Vulnerability from variot
There is an Incorrect Calculation of Buffer Size Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause kernel exceptions with the code. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have a security flaw that stems from a miscalculated buffer size
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2202", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22415" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22415" } ] }, "cve": "CVE-2021-22415", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380850", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22415", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22415", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-117", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380850", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22415", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380850" }, { "db": "VULMON", "id": "CVE-2021-22415" }, { "db": "NVD", "id": "CVE-2021-22415" }, { "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Incorrect Calculation of Buffer Size Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause kernel exceptions with the code. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have a security flaw that stems from a miscalculated buffer size", "sources": [ { "db": "NVD", "id": "CVE-2021-22415" }, { "db": "VULHUB", "id": "VHN-380850" }, { "db": "VULMON", "id": "CVE-2021-22415" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22415", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-117", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380850", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22415", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380850" }, { "db": "VULMON", "id": "CVE-2021-22415" }, { "db": "NVD", "id": "CVE-2021-22415" }, { "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "id": "VAR-202108-2202", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380850" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:14.135000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159189" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380850" }, { "db": "NVD", "id": "CVE-2021-22415" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22415" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/131.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380850" }, { "db": "VULMON", "id": "CVE-2021-22415" }, { "db": "NVD", "id": "CVE-2021-22415" }, { "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380850" }, { "db": "VULMON", "id": "CVE-2021-22415" }, { "db": "NVD", "id": "CVE-2021-22415" }, { "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380850" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22415" }, { "date": "2021-08-02T17:15:14.357000", "db": "NVD", "id": "CVE-2021-22415" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380850" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22415" }, { "date": "2021-12-09T17:55:10.180000", "db": "NVD", "id": "CVE-2021-22415" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-117" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-117" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-117" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-117" } ], "trust": 0.6 } }
var-202106-0621
Vulnerability from variot
There is an Integer Overflow Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0621", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22323" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22323" } ] }, "cve": "CVE-2021-22323", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380758", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "CVE-2021-22323", "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22323", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-1988", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380758", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22323", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380758" }, { "db": "VULMON", "id": "CVE-2021-22323" }, { "db": "NVD", "id": "CVE-2021-22323" }, { "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Integer Overflow Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws", "sources": [ { "db": "NVD", "id": "CVE-2021-22323" }, { "db": "VULHUB", "id": "VHN-380758" }, { "db": "VULMON", "id": "CVE-2021-22323" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22323", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1988", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380758", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22323", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380758" }, { "db": "VULMON", "id": "CVE-2021-22323" }, { "db": "NVD", "id": "CVE-2021-22323" }, { "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "id": "VAR-202106-0621", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380758" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:31.723000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156071" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380758" }, { "db": "NVD", "id": "CVE-2021-22323" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22323" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/772.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380758" }, { "db": "VULMON", "id": "CVE-2021-22323" }, { "db": "NVD", "id": "CVE-2021-22323" }, { "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380758" }, { "db": "VULMON", "id": "CVE-2021-22323" }, { "db": "NVD", "id": "CVE-2021-22323" }, { "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380758" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22323" }, { "date": "2021-06-30T15:15:10.323000", "db": "NVD", "id": "CVE-2021-22323" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380758" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22323" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22323" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1988" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1988" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1988" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1988" } ], "trust": 0.6 } }
var-202207-0068
Vulnerability from variot
The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0068", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34742" } ] }, "cve": "CVE-2022-34742", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-34742", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-427079", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-34742", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34742", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-414", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427079", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34742", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34742", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013198", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-414", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-61608", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427079", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34742", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "id": "VAR-202207-0068", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427079" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:42.681000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200888" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34742" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34742/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427079" }, { "db": "VULMON", "id": "CVE-2022-34742" }, { "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "db": "NVD", "id": "CVE-2022-34742" }, { "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427079" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34742" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "date": "2022-07-12T14:15:19.533000", "db": "NVD", "id": "CVE-2022-34742" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-12T00:00:00", "db": "VULHUB", "id": "VHN-427079" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34742" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013198" }, { "date": "2022-12-12T21:08:43.917000", "db": "NVD", "id": "CVE-2022-34742" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-414" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-414" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013198" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-414" } ], "trust": 0.6 } }
var-202104-1917
Vulnerability from variot
An application error verification vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to modify and delete user SMS messages. Huawei There are unspecified vulnerabilities in smartphones.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202104-1917", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "NVD", "id": "CVE-2020-9149" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9149" } ] }, "cve": "CVE-2020-9149", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9149", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-187274", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9149", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9149", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-022", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-187274", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-9149", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187274" }, { "db": "VULMON", "id": "CVE-2020-9149" }, { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "NVD", "id": "CVE-2020-9149" }, { "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An application error verification vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to modify and delete user SMS messages. Huawei There are unspecified vulnerabilities in smartphones.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2020-9149" }, { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "VULHUB", "id": "VHN-187274" }, { "db": "VULMON", "id": "CVE-2020-9149" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9149", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2020-016441", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202104-022", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187274", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-9149", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187274" }, { "db": "VULMON", "id": "CVE-2020-9149" }, { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "NVD", "id": "CVE-2020-9149" }, { "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "id": "VAR-202104-1917", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187274" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:33.873000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0 Security update \u00a02021 Year 1 Moon", "trust": 0.8, "url": "https://consumer.huawei.com/jp/support/bulletin/2021/1/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146442" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "NVD", "id": "CVE-2020-9149" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9149" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187274" }, { "db": "VULMON", "id": "CVE-2020-9149" }, { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "NVD", "id": "CVE-2020-9149" }, { "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187274" }, { "db": "VULMON", "id": "CVE-2020-9149" }, { "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "db": "NVD", "id": "CVE-2020-9149" }, { "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-01T00:00:00", "db": "VULHUB", "id": "VHN-187274" }, { "date": "2021-04-01T00:00:00", "db": "VULMON", "id": "CVE-2020-9149" }, { "date": "2021-12-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "date": "2021-04-01T18:15:12.543000", "db": "NVD", "id": "CVE-2020-9149" }, { "date": "2021-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-187274" }, { "date": "2021-04-05T00:00:00", "db": "VULMON", "id": "CVE-2020-9149" }, { "date": "2021-12-03T09:05:00", "db": "JVNDB", "id": "JVNDB-2020-016441" }, { "date": "2021-12-09T17:57:49.860000", "db": "NVD", "id": "CVE-2020-9149" }, { "date": "2021-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-022" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-022" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016441" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-022" } ], "trust": 0.6 } }
var-202202-0767
Vulnerability from variot
There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files. EMUI and Magic UI Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0767", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "NVD", "id": "CVE-2021-22448" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22448" } ] }, "cve": "CVE-2021-22448", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22448", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380883", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22448", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22448", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202202-2073", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380883", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380883" }, { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "NVD", "id": "CVE-2021-22448" }, { "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files. EMUI and Magic UI Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-22448" }, { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "VULHUB", "id": "VHN-380883" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22448", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-006298", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-2073", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380883", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380883" }, { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "NVD", "id": "CVE-2021-22448" }, { "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "id": "VAR-202202-0767", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380883" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:52.832000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0June\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185118" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-862", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380883" }, { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "NVD", "id": "CVE-2021-22448" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22448" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22448/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380883" }, { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "NVD", "id": "CVE-2021-22448" }, { "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380883" }, { "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "db": "NVD", "id": "CVE-2021-22448" }, { "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380883" }, { "date": "2023-07-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "date": "2022-02-25T19:15:10.770000", "db": "NVD", "id": "CVE-2021-22448" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380883" }, { "date": "2023-07-04T02:03:00", "db": "JVNDB", "id": "JVNDB-2022-006298" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22448" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2073" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2073" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006298" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2073" } ], "trust": 0.6 } }
var-202110-1417
Vulnerability from variot
There is an Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1417", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "NVD", "id": "CVE-2021-22406" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22406" } ] }, "cve": "CVE-2021-22406", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22406", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380841", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22406", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22406", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2037", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380841", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380841" }, { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "NVD", "id": "CVE-2021-22406" }, { "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22406" }, { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "VULHUB", "id": "VHN-380841" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22406", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014460", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2037", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380841", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380841" }, { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "NVD", "id": "CVE-2021-22406" }, { "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "id": "VAR-202110-1417", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380841" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:11.901000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168386" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-755", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "NVD", "id": "CVE-2021-22406" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22406" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380841" }, { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "NVD", "id": "CVE-2021-22406" }, { "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380841" }, { "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "db": "NVD", "id": "CVE-2021-22406" }, { "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380841" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "date": "2021-10-28T13:15:08.680000", "db": "NVD", "id": "CVE-2021-22406" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380841" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014460" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-22406" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2037" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2037" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014460" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2037" } ], "trust": 0.6 } }
var-202101-1004
Vulnerability from variot
There is an Out-of-bounds Write vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability may cause out-of-bounds access to the physical memory. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Information is obtained and denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1004", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "NVD", "id": "CVE-2020-9145" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9145" } ] }, "cve": "CVE-2020-9145", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9145", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-187270", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9145", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9145", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202101-1046", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-187270", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187270" }, { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "NVD", "id": "CVE-2020-9145" }, { "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds Write vulnerability in some Huawei smartphone. Successful exploitation of this vulnerability may cause out-of-bounds access to the physical memory. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Information is obtained and denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company", "sources": [ { "db": "NVD", "id": "CVE-2020-9145" }, { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "VULHUB", "id": "VHN-187270" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9145", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015439", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1046", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187270", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187270" }, { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "NVD", "id": "CVE-2020-9145" }, { "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "id": "VAR-202101-1004", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187270" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:37.419000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139434" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187270" }, { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "NVD", "id": "CVE-2020-9145" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9145" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187270" }, { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "NVD", "id": "CVE-2020-9145" }, { "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187270" }, { "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "db": "NVD", "id": "CVE-2020-9145" }, { "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187270" }, { "date": "2021-09-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "date": "2021-01-13T20:15:12.893000", "db": "NVD", "id": "CVE-2020-9145" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-19T00:00:00", "db": "VULHUB", "id": "VHN-187270" }, { "date": "2021-09-22T09:11:00", "db": "JVNDB", "id": "JVNDB-2020-015439" }, { "date": "2021-01-19T14:38:21.680000", "db": "NVD", "id": "CVE-2020-9145" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1046" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1046" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability regarding out-of-bounds writing on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015439" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1046" } ], "trust": 0.6 } }
var-202208-0888
Vulnerability from variot
Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI EMUI is a mobile operating system developed based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0888", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40040" } ] }, "cve": "CVE-2021-40040", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40040", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40040", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2783", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability of writing data to an arbitrary address in the HW_KEYMASTER module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI EMUI is a mobile operating system developed based on Android", "sources": [ { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "VULHUB", "id": "VHN-401441" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40040", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-020146", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2783", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-81251", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401441", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401441" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "id": "VAR-202208-0888", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401441" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:41:47.629000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI and Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204272" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40040" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40040/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401441" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401441" }, { "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "db": "NVD", "id": "CVE-2021-40040" }, { "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-401441" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "date": "2022-08-10T20:15:22.443000", "db": "NVD", "id": "CVE-2021-40040" }, { "date": "2022-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-27T00:00:00", "db": "VULHUB", "id": "VHN-401441" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020146" }, { "date": "2022-10-27T19:04:30.717000", "db": "NVD", "id": "CVE-2021-40040" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2783" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2783" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020146" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2783" } ], "trust": 0.6 } }
var-202101-1000
Vulnerability from variot
There is a vulnerability with buffer access with incorrect length value in some Huawei Smartphone.Unauthorized users may trigger code execution when a buffer overflow occurs. plural Huawei A buffer error vulnerability exists in smartphones.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1000", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "NVD", "id": "CVE-2020-9140" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9140" } ] }, "cve": "CVE-2020-9140", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2020-9140", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-187265", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-9140", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9140", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202101-1099", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-187265", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187265" }, { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "NVD", "id": "CVE-2020-9140" }, { "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability with buffer access with incorrect length value in some Huawei Smartphone.Unauthorized users may trigger code execution when a buffer overflow occurs. plural Huawei A buffer error vulnerability exists in smartphones.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company", "sources": [ { "db": "NVD", "id": "CVE-2020-9140" }, { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "VULHUB", "id": "VHN-187265" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9140", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015406", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1099", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04719", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-187265", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187265" }, { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "NVD", "id": "CVE-2020-9140" }, { "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "id": "VAR-202101-1000", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187265" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:18:00.576000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Huawei smartphone mitigation buffer error vulnerability repair measures", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139459" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-787", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187265" }, { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "NVD", "id": "CVE-2020-9140" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9140" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187265" }, { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "NVD", "id": "CVE-2020-9140" }, { "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187265" }, { "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "db": "NVD", "id": "CVE-2020-9140" }, { "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187265" }, { "date": "2021-09-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "date": "2021-01-13T22:15:14.020000", "db": "NVD", "id": "CVE-2020-9140" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-21T00:00:00", "db": "VULHUB", "id": "VHN-187265" }, { "date": "2021-09-21T09:03:00", "db": "JVNDB", "id": "JVNDB-2020-015406" }, { "date": "2021-07-21T11:39:23.747000", "db": "NVD", "id": "CVE-2020-9140" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1099" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1099" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015406" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1099" } ], "trust": 0.6 } }
var-202208-0704
Vulnerability from variot
The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0704", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40034" } ] }, "cve": "CVE-2021-40034", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40034", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40034", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202208-2403", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "VULHUB", "id": "VHN-401435" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40034", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-020147", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2403", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401435", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401435" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "id": "VAR-202208-0704", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401435" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:11:55.625000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204204" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40034" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40034/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401435" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401435" }, { "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "db": "NVD", "id": "CVE-2021-40034" }, { "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-401435" }, { "date": "2023-09-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "date": "2022-08-10T20:15:22.397000", "db": "NVD", "id": "CVE-2021-40034" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-12T00:00:00", "db": "VULHUB", "id": "VHN-401435" }, { "date": "2023-09-19T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-020147" }, { "date": "2022-08-12T21:16:26.733000", "db": "NVD", "id": "CVE-2021-40034" }, { "date": "2022-08-15T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2403" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2403" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-020147" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2403" } ], "trust": 0.6 } }
var-202207-0110
Vulnerability from variot
The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0110", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34737" } ] }, "cve": "CVE-2022-34737", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-34737", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-427081", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-34737", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34737", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202207-411", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-427081", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34737", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34737", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013203", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-411", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52821", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427081", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34737", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "id": "VAR-202207-0110", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427081" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:42.359000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199749" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34737" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34737/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427081" }, { "db": "VULMON", "id": "CVE-2022-34737" }, { "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "db": "NVD", "id": "CVE-2022-34737" }, { "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427081" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34737" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "date": "2022-07-12T14:15:19.337000", "db": "NVD", "id": "CVE-2022-34737" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427081" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34737" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013203" }, { "date": "2022-07-19T12:23:31.947000", "db": "NVD", "id": "CVE-2022-34737" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-411" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-411" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013203" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-411" } ], "trust": 0.6 } }
var-202203-0975
Vulnerability from variot
There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0975", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "NVD", "id": "CVE-2021-40062" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40062" } ] }, "cve": "CVE-2021-40062", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40062", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401463", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40062", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40062", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-973", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401463", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401463" }, { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "NVD", "id": "CVE-2021-40062" }, { "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40062" }, { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "VULHUB", "id": "VHN-401463" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40062", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018702", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-973", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401463", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401463" }, { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "NVD", "id": "CVE-2021-40062" }, { "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "id": "VAR-202203-0975", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401463" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:21.927000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186005" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401463" }, { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "NVD", "id": "CVE-2021-40062" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40062" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40062/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401463" }, { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "NVD", "id": "CVE-2021-40062" }, { "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401463" }, { "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "db": "NVD", "id": "CVE-2021-40062" }, { "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401463" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "date": "2022-03-10T17:43:24.123000", "db": "NVD", "id": "CVE-2021-40062" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401463" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018702" }, { "date": "2022-03-14T16:18:16.900000", "db": "NVD", "id": "CVE-2021-40062" }, { "date": "2022-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-973" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-973" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Classic buffer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018702" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-973" } ], "trust": 0.6 } }
var-202112-0352
Vulnerability from variot
There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed. plural Huawei A vulnerability related to use of freed memory exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0352", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37045" } ] }, "cve": "CVE-2021-37045", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-37045", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-398878", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37045", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37045", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2047", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398878", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed. plural Huawei A vulnerability related to use of freed memory exists in smartphone products.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "VULHUB", "id": "VHN-398878" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37045", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015893", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2047", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398878", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "id": "VAR-202112-0352", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398878" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:39.367000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "UAF\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173800" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37045" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398878" }, { "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "db": "NVD", "id": "CVE-2021-37045" }, { "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398878" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "date": "2021-12-08T15:15:09.380000", "db": "NVD", "id": "CVE-2021-37045" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398878" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015893" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37045" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2047" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2047" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to use of freed memory in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015893" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2047" } ], "trust": 0.6 } }
var-202209-0254
Vulnerability from variot
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0254", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39004" } ] }, "cve": "CVE-2022-39004", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-39004", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39004", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-199", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39004", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017590", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-199", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-64983", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-428496", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39004", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "id": "VAR-202209-0254", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428496" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:41:55.749000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208092" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39004" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39004/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428496" }, { "db": "VULMON", "id": "CVE-2022-39004" }, { "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "db": "NVD", "id": "CVE-2022-39004" }, { "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428496" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39004" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "date": "2022-09-16T18:15:18.053000", "db": "NVD", "id": "CVE-2022-39004" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428496" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39004" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017590" }, { "date": "2022-09-21T12:43:01.093000", "db": "NVD", "id": "CVE-2022-39004" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-199" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-199" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017590" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-199" } ], "trust": 0.6 } }
var-202207-0974
Vulnerability from variot
Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is an information disclosure vulnerability in HUAWEI EMUI 12.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0974", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40012" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40012" } ] }, "cve": "CVE-2021-40012", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401413", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-40012", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40012", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-1044", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401413", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-40012", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is an information disclosure vulnerability in HUAWEI EMUI 12.0.0", "sources": [ { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40012", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202207-1044", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-52818", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401413", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40012", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "id": "VAR-202207-0974", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401413" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:21.455000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=203734" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "NVD", "id": "CVE-2021-40012" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40012/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/668.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401413" }, { "db": "VULMON", "id": "CVE-2021-40012" }, { "db": "NVD", "id": "CVE-2021-40012" }, { "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401413" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-40012" }, { "date": "2022-07-12T14:15:14.680000", "db": "NVD", "id": "CVE-2021-40012" }, { "date": "2022-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-12T00:00:00", "db": "VULHUB", "id": "VHN-401413" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2021-40012" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-40012" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1044" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI EMUI Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1044" } ], "trust": 0.6 } }
var-202106-1919
Vulnerability from variot
There is a Missing Authentication for Critical Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1919", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "NVD", "id": "CVE-2021-22322" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22322" } ] }, "cve": "CVE-2021-22322", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22322", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380757", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22322", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22322", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-234", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380757", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380757" }, { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "NVD", "id": "CVE-2021-22322" }, { "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Missing Authentication for Critical Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22322" }, { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "VULHUB", "id": "VHN-380757" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22322", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007566", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-234", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380757", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380757" }, { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "NVD", "id": "CVE-2021-22322" }, { "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "id": "VAR-202106-1919", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380757" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:50.241000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0March\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" }, { "title": "Repair measures for Huawei smartphone access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153896" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for important features (CWE-306) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380757" }, { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "NVD", "id": "CVE-2021-22322" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22322" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380757" }, { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "NVD", "id": "CVE-2021-22322" }, { "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380757" }, { "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "db": "NVD", "id": "CVE-2021-22322" }, { "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380757" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "date": "2021-06-03T16:15:11.407000", "db": "NVD", "id": "CVE-2021-22322" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380757" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007566" }, { "date": "2021-12-09T17:57:49.440000", "db": "NVD", "id": "CVE-2021-22322" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-234" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-234" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability regarding lack of authentication for important functions in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007566" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-234" } ], "trust": 0.6 } }
var-202112-0334
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0334", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37021" } ] }, "cve": "CVE-2021-37021", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37021", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398854", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37021", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37021", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2052", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398854", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "VULHUB", "id": "VHN-398854" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37021", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015759", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2052", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398854", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "id": "VAR-202112-0334", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398854" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:11.191000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173232" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37021" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398854" }, { "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "db": "NVD", "id": "CVE-2021-37021" }, { "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398854" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "date": "2021-12-07T17:15:08.343000", "db": "NVD", "id": "CVE-2021-37021" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398854" }, { "date": "2022-11-30T01:39:00", "db": "JVNDB", "id": "JVNDB-2021-015759" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37021" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2052" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2052" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015759" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2052" } ], "trust": 0.6 } }
var-202207-0732
Vulnerability from variot
Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect integrity. HUAWEI EMUI/Magic UI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is an authorization issue vulnerability in HUAWEI EMUI/Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0732", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40013" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40013" } ] }, "cve": "CVE-2021-40013", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-401414", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2021-40013", "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "LOW", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40013", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202207-1045", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401414", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-40013", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401414" }, { "db": "VULMON", "id": "CVE-2021-40013" }, { "db": "NVD", "id": "CVE-2021-40013" }, { "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect integrity. HUAWEI EMUI/Magic UI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is an authorization issue vulnerability in HUAWEI EMUI/Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-40013" }, { "db": "VULHUB", "id": "VHN-401414" }, { "db": "VULMON", "id": "CVE-2021-40013" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40013", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202207-1045", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-52817", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401414", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40013", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401414" }, { "db": "VULMON", "id": "CVE-2021-40013" }, { "db": "NVD", "id": "CVE-2021-40013" }, { "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "id": "VAR-202207-0732", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401414" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:05.533000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200420" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-287", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401414" }, { "db": "NVD", "id": "CVE-2021-40013" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40013/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/287.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401414" }, { "db": "VULMON", "id": "CVE-2021-40013" }, { "db": "NVD", "id": "CVE-2021-40013" }, { "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401414" }, { "db": "VULMON", "id": "CVE-2021-40013" }, { "db": "NVD", "id": "CVE-2021-40013" }, { "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401414" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-40013" }, { "date": "2022-07-12T14:15:14.720000", "db": "NVD", "id": "CVE-2021-40013" }, { "date": "2022-07-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-15T00:00:00", "db": "VULHUB", "id": "VHN-401414" }, { "date": "2022-07-15T00:00:00", "db": "VULMON", "id": "CVE-2021-40013" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-40013" }, { "date": "2022-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-1045" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1045" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI EMUI Authorization problem vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1045" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-1045" } ], "trust": 0.6 } }
var-202204-0532
Vulnerability from variot
The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI contains a vulnerability related to insufficient data integrity verification.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0532", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22253" } ] }, "cve": "CVE-2022-22253", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22253", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409782", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-22253", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22253", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2020", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409782", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-22253", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability. Huawei of EMUI , HarmonyOS , Magic UI contains a vulnerability related to insufficient data integrity verification.Information may be tampered with. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22253", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-007945", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2020", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44623", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409782", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22253", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "id": "VAR-202204-0532", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409782" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:01.154000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189779" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-354", "trust": 1.1 }, { "problemtype": "Incomplete data integrity verification (CWE-354) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22253" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22253/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/354.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409782" }, { "db": "VULMON", "id": "CVE-2022-22253" }, { "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "db": "NVD", "id": "CVE-2022-22253" }, { "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-409782" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2022-22253" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "date": "2022-04-11T20:15:19.523000", "db": "NVD", "id": "CVE-2022-22253" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-18T00:00:00", "db": "VULHUB", "id": "VHN-409782" }, { "date": "2022-04-18T00:00:00", "db": "VULMON", "id": "CVE-2022-22253" }, { "date": "2023-07-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-007945" }, { "date": "2022-04-18T20:48:02.157000", "db": "NVD", "id": "CVE-2022-22253" }, { "date": "2022-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2020" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2020" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to insufficient data integrity verification in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007945" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2020" } ], "trust": 0.6 } }
var-202205-1188
Vulnerability from variot
Configuration defects in the secure OS module. Successful exploitation of this vulnerability can affect availability. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-1188", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "NVD", "id": "CVE-2021-46789" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46789" } ] }, "cve": "CVE-2021-46789", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46789", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-419301", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46789", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46789", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-3330", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-419301", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419301" }, { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "NVD", "id": "CVE-2021-46789" }, { "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability can affect availability. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android", "sources": [ { "db": "NVD", "id": "CVE-2021-46789" }, { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "VULHUB", "id": "VHN-419301" }, { "db": "VULMON", "id": "CVE-2021-46789" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46789", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009691", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-3330", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-43212", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-419301", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46789", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419301" }, { "db": "VULMON", "id": "CVE-2021-46789" }, { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "NVD", "id": "CVE-2021-46789" }, { "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "id": "VAR-202205-1188", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419301" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:58.629000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193836" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "NVD", "id": "CVE-2021-46789" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46789" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46789/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419301" }, { "db": "VULMON", "id": "CVE-2021-46789" }, { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "NVD", "id": "CVE-2021-46789" }, { "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419301" }, { "db": "VULMON", "id": "CVE-2021-46789" }, { "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "db": "NVD", "id": "CVE-2021-46789" }, { "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419301" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46789" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "date": "2022-05-13T15:15:08.617000", "db": "NVD", "id": "CVE-2021-46789" }, { "date": "2022-05-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-02-01T00:00:00", "db": "VULHUB", "id": "VHN-419301" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46789" }, { "date": "2023-08-07T08:15:00", "db": "JVNDB", "id": "JVNDB-2022-009691" }, { "date": "2023-02-01T14:19:39.810000", "db": "NVD", "id": "CVE-2021-46789" }, { "date": "2022-06-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-3330" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3330" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009691" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-3330" } ], "trust": 0.6 } }
var-202206-0936
Vulnerability from variot
Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. The following products and versions are affected: EMUI 12.0.0, EMUI 10.1.0, Magic UI 3.1.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0936", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "NVD", "id": "CVE-2022-31754" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31754" } ] }, "cve": "CVE-2022-31754", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31754", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423587", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31754", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31754", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-1175", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423587", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31754", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423587" }, { "db": "VULMON", "id": "CVE-2022-31754" }, { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "NVD", "id": "CVE-2022-31754" }, { "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. The following products and versions are affected: EMUI 12.0.0, EMUI 10.1.0, Magic UI 3.1.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31754" }, { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "VULHUB", "id": "VHN-423587" }, { "db": "VULMON", "id": "CVE-2022-31754" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31754", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011282", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-1175", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51602", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423587", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31754", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423587" }, { "db": "VULMON", "id": "CVE-2022-31754" }, { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "NVD", "id": "CVE-2022-31754" }, { "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "id": "VAR-202206-0936", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423587" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:38.177000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196788" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "NVD", "id": "CVE-2022-31754" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31754" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31754/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423587" }, { "db": "VULMON", "id": "CVE-2022-31754" }, { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "NVD", "id": "CVE-2022-31754" }, { "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423587" }, { "db": "VULMON", "id": "CVE-2022-31754" }, { "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "db": "NVD", "id": "CVE-2022-31754" }, { "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423587" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31754" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "date": "2022-06-13T16:15:08.670000", "db": "NVD", "id": "CVE-2022-31754" }, { "date": "2022-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423587" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2022-31754" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011282" }, { "date": "2022-06-18T03:13:51.353000", "db": "NVD", "id": "CVE-2022-31754" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1175" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1175" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011282" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1175" } ], "trust": 0.6 } }
var-202107-0368
Vulnerability from variot
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-0368", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22344" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22344" } ] }, "cve": "CVE-2021-22344", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380779", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22344", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22344", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202107-035", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380779", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22344", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380779" }, { "db": "VULMON", "id": "CVE-2021-22344" }, { "db": "NVD", "id": "CVE-2021-22344" }, { "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-22344" }, { "db": "VULHUB", "id": "VHN-380779" }, { "db": "VULMON", "id": "CVE-2021-22344" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22344", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202107-035", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380779", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22344", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380779" }, { "db": "VULMON", "id": "CVE-2021-22344" }, { "db": "NVD", "id": "CVE-2021-22344" }, { "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "id": "VAR-202107-0368", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380779" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:21.798000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156103" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22344" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380779" }, { "db": "VULMON", "id": "CVE-2021-22344" }, { "db": "NVD", "id": "CVE-2021-22344" }, { "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380779" }, { "db": "VULMON", "id": "CVE-2021-22344" }, { "db": "NVD", "id": "CVE-2021-22344" }, { "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-01T00:00:00", "db": "VULHUB", "id": "VHN-380779" }, { "date": "2021-07-01T00:00:00", "db": "VULMON", "id": "CVE-2021-22344" }, { "date": "2021-07-01T12:15:07.553000", "db": "NVD", "id": "CVE-2021-22344" }, { "date": "2021-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380779" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22344" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22344" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-035" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Access control error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-035" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-035" } ], "trust": 0.6 } }
var-202106-0598
Vulnerability from variot
There is an Improper Validation of Array Index Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause stability risks. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There is a security vulnerability in Huawei smartphones
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0598", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22374" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22374" } ] }, "cve": "CVE-2021-22374", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380809", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22374", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22374", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1994", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380809", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22374", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380809" }, { "db": "VULMON", "id": "CVE-2021-22374" }, { "db": "NVD", "id": "CVE-2021-22374" }, { "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Validation of Array Index Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause stability risks. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There is a security vulnerability in Huawei smartphones", "sources": [ { "db": "NVD", "id": "CVE-2021-22374" }, { "db": "VULHUB", "id": "VHN-380809" }, { "db": "VULMON", "id": "CVE-2021-22374" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22374", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1994", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380809", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22374", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380809" }, { "db": "VULMON", "id": "CVE-2021-22374" }, { "db": "NVD", "id": "CVE-2021-22374" }, { "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "id": "VAR-202106-0598", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380809" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:41.815000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for Huawei smartphone input verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156076" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380809" }, { "db": "NVD", "id": "CVE-2021-22374" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22374" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/129.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380809" }, { "db": "VULMON", "id": "CVE-2021-22374" }, { "db": "NVD", "id": "CVE-2021-22374" }, { "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380809" }, { "db": "VULMON", "id": "CVE-2021-22374" }, { "db": "NVD", "id": "CVE-2021-22374" }, { "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380809" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22374" }, { "date": "2021-06-30T15:15:10.477000", "db": "NVD", "id": "CVE-2021-22374" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380809" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22374" }, { "date": "2021-07-06T16:49:44.900000", "db": "NVD", "id": "CVE-2021-22374" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1994" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1994" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone input verification error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1994" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1994" } ], "trust": 0.6 } }
var-202110-1447
Vulnerability from variot
There is a Kernel crash vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions. Huawei Smartphones are vulnerable to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1447", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "NVD", "id": "CVE-2021-36989" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36989" } ] }, "cve": "CVE-2021-36989", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36989", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398821", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-36989", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36989", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2087", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398821", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398821" }, { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "NVD", "id": "CVE-2021-36989" }, { "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Kernel crash vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions. Huawei Smartphones are vulnerable to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36989" }, { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "VULHUB", "id": "VHN-398821" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36989", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014305", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2087", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398821", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398821" }, { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "NVD", "id": "CVE-2021-36989" }, { "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "id": "VAR-202110-1447", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398821" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:41.926000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36989", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171608" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398821" }, { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "NVD", "id": "CVE-2021-36989" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36989" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398821" }, { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "NVD", "id": "CVE-2021-36989" }, { "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398821" }, { "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "db": "NVD", "id": "CVE-2021-36989" }, { "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398821" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "date": "2021-10-28T13:15:10.530000", "db": "NVD", "id": "CVE-2021-36989" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398821" }, { "date": "2022-10-12T08:18:00", "db": "JVNDB", "id": "JVNDB-2021-014305" }, { "date": "2021-11-01T18:06:44.317000", "db": "NVD", "id": "CVE-2021-36989" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2087" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2087" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Improper Default Permission Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014305" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2087" } ], "trust": 0.6 } }
var-202110-1479
Vulnerability from variot
There is a Low memory error in Huawei Smartphone due to the unlimited size of images to be parsed.Successful exploitation of this vulnerability may cause the Gallery or Files app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1479", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "NVD", "id": "CVE-2021-36997" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36997" } ] }, "cve": "CVE-2021-36997", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36997", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398830", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36997", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36997", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2096", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398830", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398830" }, { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "NVD", "id": "CVE-2021-36997" }, { "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Low memory error in Huawei Smartphone due to the unlimited size of images to be parsed.Successful exploitation of this vulnerability may cause the Gallery or Files app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36997" }, { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "VULHUB", "id": "VHN-398830" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36997", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014261", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2096", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398830", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398830" }, { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "NVD", "id": "CVE-2021-36997" }, { "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "id": "VAR-202110-1479", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398830" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:00.500000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36997", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171622" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "NVD", "id": "CVE-2021-36997" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36997" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398830" }, { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "NVD", "id": "CVE-2021-36997" }, { "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398830" }, { "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "db": "NVD", "id": "CVE-2021-36997" }, { "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398830" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "date": "2021-10-28T13:15:10.873000", "db": "NVD", "id": "CVE-2021-36997" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398830" }, { "date": "2022-10-11T08:42:00", "db": "JVNDB", "id": "JVNDB-2021-014261" }, { "date": "2021-11-01T21:24:27.103000", "db": "NVD", "id": "CVE-2021-36997" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2096" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2096" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014261" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2096" } ], "trust": 0.6 } }
var-202209-0367
Vulnerability from variot
The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure. Huawei of EMUI , HarmonyOS , Magic UI Exists in a past traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0367", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39001" } ] }, "cve": "CVE-2022-39001", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39001", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39001", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-161", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure. Huawei of EMUI , HarmonyOS , Magic UI Exists in a past traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39001", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017593", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-161", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434772", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39001", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "id": "VAR-202209-0367", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434772" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:44.497000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208615" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39001" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39001/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434772" }, { "db": "VULMON", "id": "CVE-2022-39001" }, { "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "db": "NVD", "id": "CVE-2022-39001" }, { "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434772" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39001" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "date": "2022-09-16T18:15:17.937000", "db": "NVD", "id": "CVE-2022-39001" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434772" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39001" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017593" }, { "date": "2022-09-21T12:30:08.660000", "db": "NVD", "id": "CVE-2022-39001" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-161" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-161" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Past traversal vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017593" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-161" } ], "trust": 0.6 } }
var-202106-0591
Vulnerability from variot
There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to authentication bypass. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0 Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0591", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22367" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22367" } ] }, "cve": "CVE-2021-22367", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380802", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22367", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22367", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-2002", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380802", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22367", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380802" }, { "db": "VULMON", "id": "CVE-2021-22367" }, { "db": "NVD", "id": "CVE-2021-22367" }, { "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may lead to authentication bypass. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0 Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22367" }, { "db": "VULHUB", "id": "VHN-380802" }, { "db": "VULMON", "id": "CVE-2021-22367" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22367", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2002", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380802", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22367", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380802" }, { "db": "VULMON", "id": "CVE-2021-22367" }, { "db": "NVD", "id": "CVE-2021-22367" }, { "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "id": "VAR-202106-0591", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380802" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:51.200000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156081" }, { "title": "CVE-2021-22367", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22367 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22367" }, { "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22367" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22367" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22367" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380802" }, { "db": "VULMON", "id": "CVE-2021-22367" }, { "db": "NVD", "id": "CVE-2021-22367" }, { "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380802" }, { "db": "VULMON", "id": "CVE-2021-22367" }, { "db": "NVD", "id": "CVE-2021-22367" }, { "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380802" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22367" }, { "date": "2021-06-30T18:15:08.507000", "db": "NVD", "id": "CVE-2021-22367" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380802" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22367" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-22367" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2002" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2002" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2002" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2002" } ], "trust": 0.6 } }
var-202112-0351
Vulnerability from variot
There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0351", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37049" } ] }, "cve": "CVE-2021-37049", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37049", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398882", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37049", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37049", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2021", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398882", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "VULHUB", "id": "VHN-398882" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37049", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015857", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2021", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398882", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "id": "VAR-202112-0351", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398882" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:39.544000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Heap-based\u00a0buffer\u00a0overflow\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173789" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37049" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398882" }, { "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "db": "NVD", "id": "CVE-2021-37049" }, { "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398882" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "date": "2021-12-08T15:15:09.427000", "db": "NVD", "id": "CVE-2021-37049" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398882" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015857" }, { "date": "2021-12-09T17:59:57.660000", "db": "NVD", "id": "CVE-2021-37049" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2021" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2021" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015857" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2021" } ], "trust": 0.6 } }
var-202206-0261
Vulnerability from variot
The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0261", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31751" } ] }, "cve": "CVE-2022-31751", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31751", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423584", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31751", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31751", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-477", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423584", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31751", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31751", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011284", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-477", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66181", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423584", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31751", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "id": "VAR-202206-0261", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423584" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:40.662000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=195992" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31751" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31751/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423584" }, { "db": "VULMON", "id": "CVE-2022-31751" }, { "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "db": "NVD", "id": "CVE-2022-31751" }, { "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423584" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31751" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "date": "2022-06-13T15:15:10.047000", "db": "NVD", "id": "CVE-2022-31751" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-05T00:00:00", "db": "VULHUB", "id": "VHN-423584" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2022-31751" }, { "date": "2023-08-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-011284" }, { "date": "2022-10-05T15:16:52.523000", "db": "NVD", "id": "CVE-2022-31751" }, { "date": "2022-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-477" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-477" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011284" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-477" } ], "trust": 0.6 } }
var-202106-1929
Vulnerability from variot
There is a Security Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have an information disclosure vulnerability, which stems from configuration errors during the operation of the product
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1929", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "NVD", "id": "CVE-2021-22313" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22313" } ] }, "cve": "CVE-2021-22313", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22313", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380748", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22313", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22313", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-231", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380748", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380748" }, { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "NVD", "id": "CVE-2021-22313" }, { "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Security Function vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have an information disclosure vulnerability, which stems from configuration errors during the operation of the product", "sources": [ { "db": "NVD", "id": "CVE-2021-22313" }, { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "VULHUB", "id": "VHN-380748" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22313", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007563", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-231", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380748", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380748" }, { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "NVD", "id": "CVE-2021-22313" }, { "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "id": "VAR-202106-1929", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380748" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:26.416000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "title": "Repair measures for Huawei\u0027s smartphone information leakage vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153893" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "NVD", "id": "CVE-2021-22313" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22313" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380748" }, { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "NVD", "id": "CVE-2021-22313" }, { "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380748" }, { "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "db": "NVD", "id": "CVE-2021-22313" }, { "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380748" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "date": "2021-06-03T16:15:11.323000", "db": "NVD", "id": "CVE-2021-22313" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380748" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007563" }, { "date": "2021-12-09T17:57:49.890000", "db": "NVD", "id": "CVE-2021-22313" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-231" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-231" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007563" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-231" } ], "trust": 0.6 } }
var-202110-1362
Vulnerability from variot
There is a Directory traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have a path traversal vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1362", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "NVD", "id": "CVE-2021-22404" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22404" } ] }, "cve": "CVE-2021-22404", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22404", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380839", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22404", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22404", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2035", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380839", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380839" }, { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "NVD", "id": "CVE-2021-22404" }, { "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Directory traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have a path traversal vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22404" }, { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "VULHUB", "id": "VHN-380839" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22404", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014172", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2035", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380839", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380839" }, { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "NVD", "id": "CVE-2021-22404" }, { "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "id": "VAR-202110-1362", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380839" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:05.686000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Repair measures for path traversal vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=167717" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.1 }, { "problemtype": "Path traversal (CWE-22) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380839" }, { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "NVD", "id": "CVE-2021-22404" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22404" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380839" }, { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "NVD", "id": "CVE-2021-22404" }, { "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380839" }, { "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "db": "NVD", "id": "CVE-2021-22404" }, { "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380839" }, { "date": "2022-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "date": "2021-10-28T13:15:08.580000", "db": "NVD", "id": "CVE-2021-22404" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380839" }, { "date": "2022-10-06T08:28:00", "db": "JVNDB", "id": "JVNDB-2021-014172" }, { "date": "2021-10-28T20:59:14.587000", "db": "NVD", "id": "CVE-2021-22404" }, { "date": "2021-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2035" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Path Traversal Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014172" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2035" } ], "trust": 0.6 } }
var-202107-0369
Vulnerability from variot
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-0369", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22347" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22347" } ] }, "cve": "CVE-2021-22347", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380782", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22347", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22347", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202107-031", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380782", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22347", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380782" }, { "db": "VULMON", "id": "CVE-2021-22347" }, { "db": "NVD", "id": "CVE-2021-22347" }, { "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause temporary DoS. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-22347" }, { "db": "VULHUB", "id": "VHN-380782" }, { "db": "VULMON", "id": "CVE-2021-22347" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22347", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202107-031", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380782", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22347", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380782" }, { "db": "VULMON", "id": "CVE-2021-22347" }, { "db": "NVD", "id": "CVE-2021-22347" }, { "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "id": "VAR-202107-0369", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380782" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:19.656000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156100" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22347" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380782" }, { "db": "VULMON", "id": "CVE-2021-22347" }, { "db": "NVD", "id": "CVE-2021-22347" }, { "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380782" }, { "db": "VULMON", "id": "CVE-2021-22347" }, { "db": "NVD", "id": "CVE-2021-22347" }, { "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-01T00:00:00", "db": "VULHUB", "id": "VHN-380782" }, { "date": "2021-07-01T00:00:00", "db": "VULMON", "id": "CVE-2021-22347" }, { "date": "2021-07-01T11:15:07.423000", "db": "NVD", "id": "CVE-2021-22347" }, { "date": "2021-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380782" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22347" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22347" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-031" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-031" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Access control error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-031" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-031" } ], "trust": 0.6 } }
var-202110-1854
Vulnerability from variot
There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1854", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37119" } ] }, "cve": "CVE-2021-37119", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398955", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37119", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37119", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2227", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398955", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in a component of Huawei HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37119", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017299", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2227", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-04709", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398955", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "id": "VAR-202110-1854", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398955" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:16.744000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Service\u00a0logic\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176775" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37119" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398955" }, { "db": "VULMON", "id": "CVE-2021-37119" }, { "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "db": "NVD", "id": "CVE-2021-37119" }, { "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398955" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37119" }, { "date": "2023-01-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "date": "2022-01-03T22:15:09.450000", "db": "NVD", "id": "CVE-2021-37119" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-11T00:00:00", "db": "VULHUB", "id": "VHN-398955" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37119" }, { "date": "2023-01-13T06:15:00", "db": "JVNDB", "id": "JVNDB-2021-017299" }, { "date": "2022-01-11T19:58:15.363000", "db": "NVD", "id": "CVE-2021-37119" }, { "date": "2022-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2227" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2227" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017299" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2227" } ], "trust": 0.6 } }
var-202112-0333
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources. plural Huawei Smartphone products contain an authentication vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0333", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37043" } ] }, "cve": "CVE-2021-37043", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37043", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398876", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37043", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37043", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2064", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398876", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to malicious application processes occupy system resources. plural Huawei Smartphone products contain an authentication vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "VULHUB", "id": "VHN-398876" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37043", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015758", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2064", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398876", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "id": "VAR-202112-0333", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398876" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:00.491000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173239" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37043" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398876" }, { "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "db": "NVD", "id": "CVE-2021-37043" }, { "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398876" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "date": "2021-12-07T17:15:08.387000", "db": "NVD", "id": "CVE-2021-37043" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398876" }, { "date": "2022-11-30T01:35:00", "db": "JVNDB", "id": "JVNDB-2021-015758" }, { "date": "2021-12-09T17:48:30.133000", "db": "NVD", "id": "CVE-2021-37043" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2064" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2064" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Authentication Vulnerability in Smartphone Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015758" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2064" } ], "trust": 0.6 } }
var-202201-0226
Vulnerability from variot
There is a Configuration defects in Smartphone.Successful exploitation of this vulnerability may elevate the MEID (IMEI) permission. EMUI and Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in HuaWei Smartphone. The vulnerability stems from a configuration flaw in the Smartphone
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0226", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "NVD", "id": "CVE-2021-37121" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37121" } ] }, "cve": "CVE-2021-37121", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37121", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398958", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37121", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37121", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202201-081", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398958", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398958" }, { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "NVD", "id": "CVE-2021-37121" }, { "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration defects in Smartphone.Successful exploitation of this vulnerability may elevate the MEID (IMEI) permission. EMUI and Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in HuaWei Smartphone. The vulnerability stems from a configuration flaw in the Smartphone", "sources": [ { "db": "NVD", "id": "CVE-2021-37121" }, { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "VULHUB", "id": "VHN-398958" }, { "db": "VULMON", "id": "CVE-2021-37121" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37121", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-002915", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-081", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-05168", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398958", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37121", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398958" }, { "db": "VULMON", "id": "CVE-2021-37121" }, { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "NVD", "id": "CVE-2021-37121" }, { "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "id": "VAR-202201-0226", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398958" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:22.949000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0October\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "title": "HuaWei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176749" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "NVD", "id": "CVE-2021-37121" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37121" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398958" }, { "db": "VULMON", "id": "CVE-2021-37121" }, { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "NVD", "id": "CVE-2021-37121" }, { "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398958" }, { "db": "VULMON", "id": "CVE-2021-37121" }, { "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "db": "NVD", "id": "CVE-2021-37121" }, { "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398958" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37121" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "date": "2022-01-03T22:15:09.550000", "db": "NVD", "id": "CVE-2021-37121" }, { "date": "2022-01-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398958" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37121" }, { "date": "2023-01-27T05:20:00", "db": "JVNDB", "id": "JVNDB-2022-002915" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37121" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-081" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-081" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002915" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-081" } ], "trust": 0.6 } }
var-202203-0267
Vulnerability from variot
There is a permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI and Magic UI There is a vulnerability in improper default permissions.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0267", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "NVD", "id": "CVE-2021-40059" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40059" } ] }, "cve": "CVE-2021-40059", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40059", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-401460", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40059", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40059", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202203-976", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401460", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401460" }, { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "NVD", "id": "CVE-2021-40059" }, { "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect confidentiality. Huawei of EMUI and Magic UI There is a vulnerability in improper default permissions.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40059" }, { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "VULHUB", "id": "VHN-401460" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40059", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018705", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-976", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401460", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401460" }, { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "NVD", "id": "CVE-2021-40059" }, { "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "id": "VAR-202203-0267", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401460" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:38.075000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI and Honor Magic Ui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185890" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401460" }, { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "NVD", "id": "CVE-2021-40059" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40059" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40059/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401460" }, { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "NVD", "id": "CVE-2021-40059" }, { "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401460" }, { "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "db": "NVD", "id": "CVE-2021-40059" }, { "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401460" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "date": "2022-03-10T17:43:22.803000", "db": "NVD", "id": "CVE-2021-40059" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401460" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018705" }, { "date": "2022-03-14T16:15:48.380000", "db": "NVD", "id": "CVE-2021-40059" }, { "date": "2022-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-976" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-976" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018705" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-976" } ], "trust": 0.6 } }
var-202203-0964
Vulnerability from variot
There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability. Huawei of EMUI , HarmonyOS , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0964", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40048" } ] }, "cve": "CVE-2021-40048", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40048", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401449", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40048", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40048", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-996", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401449", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability. Huawei of EMUI , HarmonyOS , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "VULHUB", "id": "VHN-401449" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40048", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018716", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-996", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401449", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "id": "VAR-202203-0964", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401449" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:49.734000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI/Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185902" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 }, { "problemtype": "Miscalculation of buffer size (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40048" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40048/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401449" }, { "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "db": "NVD", "id": "CVE-2021-40048" }, { "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401449" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "date": "2022-03-10T17:43:17.003000", "db": "NVD", "id": "CVE-2021-40048" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401449" }, { "date": "2023-07-05T08:12:00", "db": "JVNDB", "id": "JVNDB-2021-018716" }, { "date": "2022-03-14T15:35:36.367000", "db": "NVD", "id": "CVE-2021-40048" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-996" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-996" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer size miscalculation vulnerability in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018716" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-996" } ], "trust": 0.6 } }
var-202206-0002
Vulnerability from variot
HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. Attackers can exploit this vulnerability to obtain CPLC information
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0002", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46811" } ] }, "cve": "CVE-2021-46811", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-46811", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423544", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-46811", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46811", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-468", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423544", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. Attackers can exploit this vulnerability to obtain CPLC information", "sources": [ { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46811", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012101", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-468", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51605", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423544", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46811", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "id": "VAR-202206-0002", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423544" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:22.574000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46811" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46811/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423544" }, { "db": "VULMON", "id": "CVE-2021-46811" }, { "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "db": "NVD", "id": "CVE-2021-46811" }, { "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423544" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46811" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "date": "2022-06-13T16:15:08.080000", "db": "NVD", "id": "CVE-2021-46811" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423544" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46811" }, { "date": "2023-08-25T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-012101" }, { "date": "2022-06-27T16:09:54.217000", "db": "NVD", "id": "CVE-2021-46811" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-468" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-468" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012101" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-468" } ], "trust": 0.6 } }
var-202106-1926
Vulnerability from variot
There is an Improper Validation of Array Index vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute, thus obtaining system permissions. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1926", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "NVD", "id": "CVE-2021-22333" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22333" } ] }, "cve": "CVE-2021-22333", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22333", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-380768", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22333", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22333", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-243", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380768", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380768" }, { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "NVD", "id": "CVE-2021-22333" }, { "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Validation of Array Index vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause code to execute, thus obtaining system permissions. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22333" }, { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "VULHUB", "id": "VHN-380768" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22333", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007570", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-243", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380768", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380768" }, { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "NVD", "id": "CVE-2021-22333" }, { "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "id": "VAR-202106-1926", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380768" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:08.878000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0April\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "title": "Repair measures for Huawei mobile phone input verification error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153900" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-129", "trust": 1.1 }, { "problemtype": "Improper validation of array indexes (CWE-129) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380768" }, { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "NVD", "id": "CVE-2021-22333" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22333" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380768" }, { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "NVD", "id": "CVE-2021-22333" }, { "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380768" }, { "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "db": "NVD", "id": "CVE-2021-22333" }, { "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380768" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "date": "2021-06-03T20:15:08.433000", "db": "NVD", "id": "CVE-2021-22333" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380768" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007570" }, { "date": "2021-12-09T17:57:49.923000", "db": "NVD", "id": "CVE-2021-22333" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-243" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-243" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in array index validation on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007570" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-243" } ], "trust": 0.6 } }
var-202110-1361
Vulnerability from variot
There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1361", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "NVD", "id": "CVE-2021-22405" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22405" } ] }, "cve": "CVE-2021-22405", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22405", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380840", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22405", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22405", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2036", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380840", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22405", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380840" }, { "db": "VULMON", "id": "CVE-2021-22405" }, { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "NVD", "id": "CVE-2021-22405" }, { "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22405" }, { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "VULHUB", "id": "VHN-380840" }, { "db": "VULMON", "id": "CVE-2021-22405" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22405", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014171", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2036", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380840", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22405", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380840" }, { "db": "VULMON", "id": "CVE-2021-22405" }, { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "NVD", "id": "CVE-2021-22405" }, { "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "id": "VAR-202110-1361", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380840" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:24.006000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Fixes for configuration error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=167718" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "NVD", "id": "CVE-2021-22405" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22405" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380840" }, { "db": "VULMON", "id": "CVE-2021-22405" }, { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "NVD", "id": "CVE-2021-22405" }, { "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380840" }, { "db": "VULMON", "id": "CVE-2021-22405" }, { "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "db": "NVD", "id": "CVE-2021-22405" }, { "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380840" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22405" }, { "date": "2022-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "date": "2021-10-28T13:15:08.630000", "db": "NVD", "id": "CVE-2021-22405" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380840" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22405" }, { "date": "2022-10-06T08:22:00", "db": "JVNDB", "id": "JVNDB-2021-014171" }, { "date": "2021-10-28T20:58:18.457000", "db": "NVD", "id": "CVE-2021-22405" }, { "date": "2021-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2036" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2036" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014171" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "configuration error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2036" } ], "trust": 0.6 } }
var-202106-1925
Vulnerability from variot
There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause app redirections. Huawei Smartphones contain vulnerabilities related to fraudulent authentication.Information may be tampered with. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Certain Huawei phones contain an access control error vulnerability that could be exploited by an attacker to cause application redirection. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1925", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "NVD", "id": "CVE-2021-22334" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22334" } ] }, "cve": "CVE-2021-22334", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22334", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-380769", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 4.0, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.4, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22334", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Changed", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22334", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-244", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380769", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-22334", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380769" }, { "db": "VULMON", "id": "CVE-2021-22334" }, { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "NVD", "id": "CVE-2021-22334" }, { "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Access Control vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause app redirections. Huawei Smartphones contain vulnerabilities related to fraudulent authentication.Information may be tampered with. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Certain Huawei phones contain an access control error vulnerability that could be exploited by an attacker to cause application redirection. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22334" }, { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "VULHUB", "id": "VHN-380769" }, { "db": "VULMON", "id": "CVE-2021-22334" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22334", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-007571", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-244", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380769", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22334", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380769" }, { "db": "VULMON", "id": "CVE-2021-22334" }, { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "NVD", "id": "CVE-2021-22334" }, { "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "id": "VAR-202106-1925", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380769" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:41.102000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0April\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "title": "Repair measures for vulnerabilities of Huawei mobile phone access control errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153901" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "Bad authentication (CWE-863) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380769" }, { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "NVD", "id": "CVE-2021-22334" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22334" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/863.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380769" }, { "db": "VULMON", "id": "CVE-2021-22334" }, { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "NVD", "id": "CVE-2021-22334" }, { "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380769" }, { "db": "VULMON", "id": "CVE-2021-22334" }, { "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "db": "NVD", "id": "CVE-2021-22334" }, { "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380769" }, { "date": "2021-06-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22334" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "date": "2021-06-03T20:15:08.470000", "db": "NVD", "id": "CVE-2021-22334" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380769" }, { "date": "2021-06-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22334" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007571" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22334" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-244" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-244" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Fraud related to unauthorized authentication on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007571" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-244" } ], "trust": 0.6 } }
var-202108-2195
Vulnerability from variot
There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. Huawei There are race condition vulnerabilities in smartphones.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2195", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "NVD", "id": "CVE-2021-22384" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22384" } ] }, "cve": "CVE-2021-22384", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22384", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-380819", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.1, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22384", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22384", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-102", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380819", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22384", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380819" }, { "db": "VULMON", "id": "CVE-2021-22384" }, { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "NVD", "id": "CVE-2021-22384" }, { "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. Huawei There are race condition vulnerabilities in smartphones.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22384" }, { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "VULHUB", "id": "VHN-380819" }, { "db": "VULMON", "id": "CVE-2021-22384" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22384", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010878", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-102", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380819", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22384", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380819" }, { "db": "VULMON", "id": "CVE-2021-22384" }, { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "NVD", "id": "CVE-2021-22384" }, { "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "id": "VAR-202108-2195", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380819" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:10.290000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22384", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159076" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380819" }, { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "NVD", "id": "CVE-2021-22384" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22384" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/362.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380819" }, { "db": "VULMON", "id": "CVE-2021-22384" }, { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "NVD", "id": "CVE-2021-22384" }, { "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380819" }, { "db": "VULMON", "id": "CVE-2021-22384" }, { "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "db": "NVD", "id": "CVE-2021-22384" }, { "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380819" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22384" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "date": "2021-08-02T17:15:13.723000", "db": "NVD", "id": "CVE-2021-22384" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380819" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22384" }, { "date": "2022-07-11T05:42:00", "db": "JVNDB", "id": "JVNDB-2021-010878" }, { "date": "2021-12-09T17:55:10.140000", "db": "NVD", "id": "CVE-2021-22384" }, { "date": "2022-03-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-102" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-102" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Race condition vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010878" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-102" } ], "trust": 0.6 } }
var-202106-1928
Vulnerability from variot
There is a Missing Authentication for Critical Function vulnerability in Huawei Smartphone. Attackers with physical access to the device can thereby exploit this vulnerability. A successful exploitation of this vulnerability can compromise the device's data security and functional availability. Huawei Smartphones are vulnerable to lack of authentication for critical features.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1928", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "NVD", "id": "CVE-2021-22316" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22316" } ] }, "cve": "CVE-2021-22316", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22316", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-380751", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Physical", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.8, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22316", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22316", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-232", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380751", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380751" }, { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "NVD", "id": "CVE-2021-22316" }, { "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Missing Authentication for Critical Function vulnerability in Huawei Smartphone. Attackers with physical access to the device can thereby exploit this vulnerability. A successful exploitation of this vulnerability can compromise the device\u0027s data security and functional availability. Huawei Smartphones are vulnerable to lack of authentication for critical features.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22316" }, { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "VULHUB", "id": "VHN-380751" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22316", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007564", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-232", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380751", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380751" }, { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "NVD", "id": "CVE-2021-22316" }, { "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "id": "VAR-202106-1928", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380751" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:10.761000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "title": "Repair measures for Huawei smartphone access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153894" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.1 }, { "problemtype": "Lack of authentication for important features (CWE-306) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380751" }, { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "NVD", "id": "CVE-2021-22316" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22316" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380751" }, { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "NVD", "id": "CVE-2021-22316" }, { "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380751" }, { "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "db": "NVD", "id": "CVE-2021-22316" }, { "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380751" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "date": "2021-06-03T16:15:11.350000", "db": "NVD", "id": "CVE-2021-22316" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380751" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007564" }, { "date": "2021-12-09T17:57:49.903000", "db": "NVD", "id": "CVE-2021-22316" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-232" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability regarding lack of authentication for important functions in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007564" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-232" } ], "trust": 0.6 } }
var-202112-0354
Vulnerability from variot
There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0354", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37039" } ] }, "cve": "CVE-2021-37039", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 3.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37039", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 3.3, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "VHN-398872", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37039", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37039", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202109-2035", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398872", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "VULHUB", "id": "VHN-398872" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37039", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015890", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2035", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08330", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398872", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "id": "VAR-202112-0354", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398872" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:00.458000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Input\u00a0verification\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173793" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37039" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398872" }, { "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "db": "NVD", "id": "CVE-2021-37039" }, { "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398872" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "date": "2021-12-08T15:15:09.210000", "db": "NVD", "id": "CVE-2021-37039" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398872" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015890" }, { "date": "2021-12-09T17:52:24.587000", "db": "NVD", "id": "CVE-2021-37039" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2035" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2035" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015890" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2035" } ], "trust": 0.6 } }
var-202112-0355
Vulnerability from variot
There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0355", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37037" } ] }, "cve": "CVE-2021-37037", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37037", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398870", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37037", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37037", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2049", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398870", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart. plural Huawei Smartphone products have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "VULHUB", "id": "VHN-398870" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37037", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015889", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2049", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398870", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "id": "VAR-202112-0355", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398870" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:11.167000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Invalid\u00a0address\u00a0access\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0devices", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173802" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37037" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398870" }, { "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "db": "NVD", "id": "CVE-2021-37037" }, { "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398870" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "date": "2021-12-08T15:15:09.147000", "db": "NVD", "id": "CVE-2021-37037" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398870" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015889" }, { "date": "2021-12-09T17:51:40.283000", "db": "NVD", "id": "CVE-2021-37037" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2049" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2049" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerabilities in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015889" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2049" } ], "trust": 0.6 } }
var-202106-1917
Vulnerability from variot
There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may result in video streams being intercepted during transmission. Huawei Smartphones contain vulnerabilities in the transmission of important information in clear text.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1917", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "NVD", "id": "CVE-2021-22325" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22325" } ] }, "cve": "CVE-2021-22325", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22325", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380760", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22325", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22325", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-236", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380760", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380760" }, { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "NVD", "id": "CVE-2021-22325" }, { "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may result in video streams being intercepted during transmission. Huawei Smartphones contain vulnerabilities in the transmission of important information in clear text.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22325" }, { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "VULHUB", "id": "VHN-380760" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22325", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007568", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-236", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380760", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380760" }, { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "NVD", "id": "CVE-2021-22325" }, { "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "id": "VAR-202106-1917", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380760" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:35.737000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0March\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" }, { "title": "Repair measures for Huawei\u0027s smartphone information leakage vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153898" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-319", "trust": 1.1 }, { "problemtype": "Sending important information in clear text (CWE-319) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380760" }, { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "NVD", "id": "CVE-2021-22325" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22325" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380760" }, { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "NVD", "id": "CVE-2021-22325" }, { "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380760" }, { "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "db": "NVD", "id": "CVE-2021-22325" }, { "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380760" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "date": "2021-06-03T17:15:07.893000", "db": "NVD", "id": "CVE-2021-22325" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380760" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007568" }, { "date": "2021-12-09T17:57:49.457000", "db": "NVD", "id": "CVE-2021-22325" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-236" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-236" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in plaintext transmission of important information on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007568" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-236" } ], "trust": 0.6 } }
var-202106-0597
Vulnerability from variot
There is a Defects Introduced in the Design Process Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There is a security vulnerability in Huawei smartphones
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0597", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22373" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22373" } ] }, "cve": "CVE-2021-22373", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380808", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22373", "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22373", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-1995", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380808", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22373", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380808" }, { "db": "VULMON", "id": "CVE-2021-22373" }, { "db": "NVD", "id": "CVE-2021-22373" }, { "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Defects Introduced in the Design Process Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service integrity and availability. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There is a security vulnerability in Huawei smartphones", "sources": [ { "db": "NVD", "id": "CVE-2021-22373" }, { "db": "VULHUB", "id": "VHN-380808" }, { "db": "VULMON", "id": "CVE-2021-22373" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22373", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1995", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380808", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22373", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380808" }, { "db": "VULMON", "id": "CVE-2021-22373" }, { "db": "NVD", "id": "CVE-2021-22373" }, { "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "id": "VAR-202106-0597", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380808" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:16.886000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156077" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22373" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22373" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380808" }, { "db": "VULMON", "id": "CVE-2021-22373" }, { "db": "NVD", "id": "CVE-2021-22373" }, { "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380808" }, { "db": "VULMON", "id": "CVE-2021-22373" }, { "db": "NVD", "id": "CVE-2021-22373" }, { "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380808" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22373" }, { "date": "2021-06-30T15:15:10.443000", "db": "NVD", "id": "CVE-2021-22373" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380808" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22373" }, { "date": "2021-07-06T16:24:01.517000", "db": "NVD", "id": "CVE-2021-22373" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1995" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1995" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1995" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1995" } ], "trust": 0.6 } }
var-202206-0024
Vulnerability from variot
Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HarmonyOS 2.0. The vulnerability is due to the pop-up problem after the lock screen of the USSD service customized by the operator
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0024", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31760" } ] }, "cve": "CVE-2022-31760", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31760", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423593", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31760", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31760", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202206-472", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-423593", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31760", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained and information may be tampered with. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HarmonyOS 2.0. The vulnerability is due to the pop-up problem after the lock screen of the USSD service customized by the operator", "sources": [ { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31760", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012033", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-472", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66176", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423593", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31760", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "id": "VAR-202206-0024", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423593" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:05.246000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=198079" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31760" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31760/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423593" }, { "db": "VULMON", "id": "CVE-2022-31760" }, { "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "db": "NVD", "id": "CVE-2022-31760" }, { "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423593" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31760" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "date": "2022-06-13T16:15:08.770000", "db": "NVD", "id": "CVE-2022-31760" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423593" }, { "date": "2022-06-27T00:00:00", "db": "VULMON", "id": "CVE-2022-31760" }, { "date": "2023-08-25T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-012033" }, { "date": "2022-06-27T16:15:59.833000", "db": "NVD", "id": "CVE-2022-31760" }, { "date": "2022-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-472" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-472" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012033" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-472" } ], "trust": 0.6 } }
var-202205-0114
Vulnerability from variot
The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash. Huawei of EMUI , Magic UI , HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0114", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46787" } ] }, "cve": "CVE-2021-46787", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46787", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-419299", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46787", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46787", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202205-2555", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-419299", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash. Huawei of EMUI , Magic UI , HarmonyOS Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46787", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009693", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2555", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-419299", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46787", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "id": "VAR-202205-0114", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419299" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:43.564000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193776" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46787" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46787/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419299" }, { "db": "VULMON", "id": "CVE-2021-46787" }, { "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "db": "NVD", "id": "CVE-2021-46787" }, { "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419299" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46787" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "date": "2022-05-13T15:15:08.523000", "db": "NVD", "id": "CVE-2021-46787" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-419299" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46787" }, { "date": "2023-08-07T08:16:00", "db": "JVNDB", "id": "JVNDB-2022-009693" }, { "date": "2022-05-23T18:47:27.837000", "db": "NVD", "id": "CVE-2021-46787" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2555" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2555" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009693" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2555" } ], "trust": 0.6 } }
var-202203-0265
Vulnerability from variot
There is a heap-based and stack-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0265", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "NVD", "id": "CVE-2021-40057" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40057" } ] }, "cve": "CVE-2021-40057", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40057", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401458", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40057", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40057", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-978", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401458", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401458" }, { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "NVD", "id": "CVE-2021-40057" }, { "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap-based and stack-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability. Huawei of EMUI and Magic UI Exists in an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40057" }, { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "VULHUB", "id": "VHN-401458" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40057", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018707", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-978", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401458", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401458" }, { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "NVD", "id": "CVE-2021-40057" }, { "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "id": "VAR-202203-0265", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401458" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:09.185000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI/Magic UI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186008" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401458" }, { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "NVD", "id": "CVE-2021-40057" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40057" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40057/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401458" }, { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "NVD", "id": "CVE-2021-40057" }, { "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401458" }, { "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "db": "NVD", "id": "CVE-2021-40057" }, { "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401458" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "date": "2022-03-10T17:43:21.850000", "db": "NVD", "id": "CVE-2021-40057" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401458" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018707" }, { "date": "2022-03-14T16:02:24.627000", "db": "NVD", "id": "CVE-2021-40057" }, { "date": "2022-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-978" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-978" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds write vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018707" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-978" } ], "trust": 0.6 } }
var-202108-2199
Vulnerability from variot
There is a Configuration Defect Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have a security flaw that stems from a configuration flaw
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2199", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22435" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22435" } ] }, "cve": "CVE-2021-22435", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380870", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22435", "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22435", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-122", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380870", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22435", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380870" }, { "db": "VULMON", "id": "CVE-2021-22435" }, { "db": "NVD", "id": "CVE-2021-22435" }, { "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Configuration Defect Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have a security flaw that stems from a configuration flaw", "sources": [ { "db": "NVD", "id": "CVE-2021-22435" }, { "db": "VULHUB", "id": "VHN-380870" }, { "db": "VULMON", "id": "CVE-2021-22435" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22435", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-122", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380870", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22435", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380870" }, { "db": "VULMON", "id": "CVE-2021-22435" }, { "db": "NVD", "id": "CVE-2021-22435" }, { "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "id": "VAR-202108-2199", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380870" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:32.939000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159054" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22435" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22435" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380870" }, { "db": "VULMON", "id": "CVE-2021-22435" }, { "db": "NVD", "id": "CVE-2021-22435" }, { "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380870" }, { "db": "VULMON", "id": "CVE-2021-22435" }, { "db": "NVD", "id": "CVE-2021-22435" }, { "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380870" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22435" }, { "date": "2021-08-02T17:15:14.480000", "db": "NVD", "id": "CVE-2021-22435" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380870" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22435" }, { "date": "2021-12-09T17:55:10.197000", "db": "NVD", "id": "CVE-2021-22435" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-122" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-122" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-122" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-122" } ], "trust": 0.6 } }
var-202108-2201
Vulnerability from variot
There is a Heap-based Buffer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have security flaws
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2201", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22427" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22427" } ] }, "cve": "CVE-2021-22427", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-380862", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2021-22427", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22427", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-118", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380862", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22427", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380862" }, { "db": "VULMON", "id": "CVE-2021-22427" }, { "db": "NVD", "id": "CVE-2021-22427" }, { "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based Buffer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Huawei smartphones have security flaws", "sources": [ { "db": "NVD", "id": "CVE-2021-22427" }, { "db": "VULHUB", "id": "VHN-380862" }, { "db": "VULMON", "id": "CVE-2021-22427" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22427", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-118", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380862", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22427", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380862" }, { "db": "VULMON", "id": "CVE-2021-22427" }, { "db": "NVD", "id": "CVE-2021-22427" }, { "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "id": "VAR-202108-2201", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380862" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:44.832000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159190" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380862" }, { "db": "NVD", "id": "CVE-2021-22427" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22427" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/362.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380862" }, { "db": "VULMON", "id": "CVE-2021-22427" }, { "db": "NVD", "id": "CVE-2021-22427" }, { "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380862" }, { "db": "VULMON", "id": "CVE-2021-22427" }, { "db": "NVD", "id": "CVE-2021-22427" }, { "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380862" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22427" }, { "date": "2021-08-02T17:15:14.400000", "db": "NVD", "id": "CVE-2021-22427" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380862" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22427" }, { "date": "2021-12-09T17:55:10.187000", "db": "NVD", "id": "CVE-2021-22427" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-118" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-118" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-118" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-118" } ], "trust": 0.6 } }
var-202108-2203
Vulnerability from variot
There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random kernel address access
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2203", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22412" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22412" } ] }, "cve": "CVE-2021-22412", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380847", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22412", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22412", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-113", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380847", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22412", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380847" }, { "db": "VULMON", "id": "CVE-2021-22412" }, { "db": "NVD", "id": "CVE-2021-22412" }, { "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random kernel address access", "sources": [ { "db": "NVD", "id": "CVE-2021-22412" }, { "db": "VULHUB", "id": "VHN-380847" }, { "db": "VULMON", "id": "CVE-2021-22412" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22412", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-113", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380847", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22412", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380847" }, { "db": "VULMON", "id": "CVE-2021-22412" }, { "db": "NVD", "id": "CVE-2021-22412" }, { "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "id": "VAR-202108-2203", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380847" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:20.312000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159186" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380847" }, { "db": "NVD", "id": "CVE-2021-22412" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22412" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380847" }, { "db": "VULMON", "id": "CVE-2021-22412" }, { "db": "NVD", "id": "CVE-2021-22412" }, { "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380847" }, { "db": "VULMON", "id": "CVE-2021-22412" }, { "db": "NVD", "id": "CVE-2021-22412" }, { "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380847" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22412" }, { "date": "2021-08-02T17:15:14.220000", "db": "NVD", "id": "CVE-2021-22412" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380847" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22412" }, { "date": "2021-12-09T17:55:10.177000", "db": "NVD", "id": "CVE-2021-22412" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-113" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-113" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-113" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-113" } ], "trust": 0.6 } }
var-202207-0132
Vulnerability from variot
The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0132", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46741" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46741" } ] }, "cve": "CVE-2021-46741", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-418650", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-46741", "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46741", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-409", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-418650", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46741", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46741", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202207-409", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-57613", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-418650", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46741", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "id": "VAR-202207-0132", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-418650" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:06:38.800000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200693" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46741" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46741/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-418650" }, { "db": "VULMON", "id": "CVE-2021-46741" }, { "db": "NVD", "id": "CVE-2021-46741" }, { "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-418650" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2021-46741" }, { "date": "2022-07-12T14:15:14.857000", "db": "NVD", "id": "CVE-2021-46741" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-12T00:00:00", "db": "VULHUB", "id": "VHN-418650" }, { "date": "2022-07-18T00:00:00", "db": "VULMON", "id": "CVE-2021-46741" }, { "date": "2022-12-12T21:08:02.043000", "db": "NVD", "id": "CVE-2021-46741" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-409" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-409" } ], "trust": 0.6 } }
var-202104-1920
Vulnerability from variot
A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to cause memory leakage and doS attacks by carefully constructing attack scenarios. Huawei Smartphones contain a vulnerability regarding the lack of resource release after a valid lifetime.Denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202104-1920", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "NVD", "id": "CVE-2020-9146" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9146" } ] }, "cve": "CVE-2020-9146", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 1.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9146", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "id": "VHN-187271", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9146", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9146", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-027", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-187271", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-9146", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187271" }, { "db": "VULMON", "id": "CVE-2020-9146" }, { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "NVD", "id": "CVE-2020-9146" }, { "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A memory buffer error vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to cause memory leakage and doS attacks by carefully constructing attack scenarios. Huawei Smartphones contain a vulnerability regarding the lack of resource release after a valid lifetime.Denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2020-9146" }, { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "VULHUB", "id": "VHN-187271" }, { "db": "VULMON", "id": "CVE-2020-9146" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9146", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2020-016448", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202104-027", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187271", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-9146", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187271" }, { "db": "VULMON", "id": "CVE-2020-9146" }, { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "NVD", "id": "CVE-2020-9146" }, { "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "id": "VAR-202104-1920", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187271" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:33.316000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0 Security update \u00a02021 Year 1 Moon", "trust": 0.8, "url": "https://consumer.huawei.com/jp/support/bulletin/2021/1/" }, { "title": "Huawei Emui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146445" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-772", "trust": 1.1 }, { "problemtype": "Lack of resource release after valid lifetime (CWE-772) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187271" }, { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "NVD", "id": "CVE-2020-9146" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9146" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/772.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187271" }, { "db": "VULMON", "id": "CVE-2020-9146" }, { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "NVD", "id": "CVE-2020-9146" }, { "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187271" }, { "db": "VULMON", "id": "CVE-2020-9146" }, { "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "db": "NVD", "id": "CVE-2020-9146" }, { "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-01T00:00:00", "db": "VULHUB", "id": "VHN-187271" }, { "date": "2021-04-01T00:00:00", "db": "VULMON", "id": "CVE-2020-9146" }, { "date": "2021-12-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "date": "2021-04-01T18:15:12.293000", "db": "NVD", "id": "CVE-2020-9146" }, { "date": "2021-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-187271" }, { "date": "2021-04-06T00:00:00", "db": "VULMON", "id": "CVE-2020-9146" }, { "date": "2021-12-07T01:44:00", "db": "JVNDB", "id": "JVNDB-2020-016448" }, { "date": "2021-12-09T17:57:49.827000", "db": "NVD", "id": "CVE-2020-9146" }, { "date": "2021-04-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-027" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-027" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability regarding lack of release of resources after valid lifetime on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016448" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-027" } ], "trust": 0.6 } }
var-202111-1770
Vulnerability from variot
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource disclosure vulnerability to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1770", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39969" } ] }, "cve": "CVE-2021-39969", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39969", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401370", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39969", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39969", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2130", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401370", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-39969", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. plural Huawei Smartphone products contain a resource disclosure vulnerability to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39969", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017612", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2130", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401370", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-39969", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "id": "VAR-202111-1770", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401370" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:33.641000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176791" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39969" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/668.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401370" }, { "db": "VULMON", "id": "CVE-2021-39969" }, { "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "db": "NVD", "id": "CVE-2021-39969" }, { "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-401370" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-39969" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "date": "2022-01-03T22:15:10.093000", "db": "NVD", "id": "CVE-2021-39969" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401370" }, { "date": "2022-01-13T00:00:00", "db": "VULMON", "id": "CVE-2021-39969" }, { "date": "2023-01-27T07:14:00", "db": "JVNDB", "id": "JVNDB-2021-017612" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-39969" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2130" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2130" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to resource leakage to the wrong area in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017612" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2130" } ], "trust": 0.6 } }
var-202110-1493
Vulnerability from variot
There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups. Huawei Smartphones contain a link interpretation vulnerability.Information may be tampered with. Huawei Smartphone is a smartphone of China's Huawei (Huawei) company.
There is an authorization issue vulnerability in many Huawei devices
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1493", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "NVD", "id": "CVE-2021-22488" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22488" } ] }, "cve": "CVE-2021-22488", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22488", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2021-84243", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380923", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22488", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22488", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2021-84243", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2079", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380923", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "VULHUB", "id": "VHN-380923" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "NVD", "id": "CVE-2021-22488" }, { "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups. Huawei Smartphones contain a link interpretation vulnerability.Information may be tampered with. Huawei Smartphone is a smartphone of China\u0027s Huawei (Huawei) company. \n\r\n\r\nThere is an authorization issue vulnerability in many Huawei devices", "sources": [ { "db": "NVD", "id": "CVE-2021-22488" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "VULHUB", "id": "VHN-380923" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22488", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2021-014312", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-84243", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202110-2079", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380923", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "VULHUB", "id": "VHN-380923" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "NVD", "id": "CVE-2021-22488" }, { "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "id": "VAR-202110-1493", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "VULHUB", "id": "VHN-380923" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" } ] }, "last_update_date": "2023-12-18T13:27:32.834000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22488", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Patch for Huawei Smartphone Authorization Issue Vulnerability (CNVD-2021-84243)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/296886" }, { "title": "Huawei Smartphone Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168218" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-59", "trust": 1.1 }, { "problemtype": "Link interpretation problem (CWE-59) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380923" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "NVD", "id": "CVE-2021-22488" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22488" }, { "trust": 0.6, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2021-22488" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "VULHUB", "id": "VHN-380923" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "NVD", "id": "CVE-2021-22488" }, { "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-84243" }, { "db": "VULHUB", "id": "VHN-380923" }, { "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "db": "NVD", "id": "CVE-2021-22488" }, { "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-05T00:00:00", "db": "CNVD", "id": "CNVD-2021-84243" }, { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380923" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "date": "2021-10-28T13:15:10.227000", "db": "NVD", "id": "CVE-2021-22488" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-05T00:00:00", "db": "CNVD", "id": "CNVD-2021-84243" }, { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380923" }, { "date": "2022-10-12T08:33:00", "db": "JVNDB", "id": "JVNDB-2021-014312" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22488" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2079" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2079" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Link Interpretation Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014312" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "post link", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2079" } ], "trust": 0.6 } }
var-202209-1094
Vulnerability from variot
Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice. Huawei of EMUI , HarmonyOS , Magic UI contains a double free vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1094", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39002" } ] }, "cve": "CVE-2022-39002", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39002", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39002", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-1277", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Double free vulnerability in the storage module. Successful exploitation of this vulnerability will cause the memory to be freed twice. Huawei of EMUI , HarmonyOS , Magic UI contains a double free vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39002", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017592", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1277", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434773", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39002", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "id": "VAR-202209-1094", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434773" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:13.512000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=209481" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202210-0000001416095697" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39002" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39002/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202210-0000001416375445" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434773" }, { "db": "VULMON", "id": "CVE-2022-39002" }, { "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "db": "NVD", "id": "CVE-2022-39002" }, { "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434773" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39002" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "date": "2022-09-16T18:15:17.977000", "db": "NVD", "id": "CVE-2022-39002" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-11-03T00:00:00", "db": "VULHUB", "id": "VHN-434773" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39002" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017592" }, { "date": "2022-11-03T20:43:29.643000", "db": "NVD", "id": "CVE-2022-39002" }, { "date": "2022-10-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1277" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1277" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product double free vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017592" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1277" } ], "trust": 0.6 } }
var-202108-2204
Vulnerability from variot
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. Huawei A vulnerability exists in smartphones regarding the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2204", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "NVD", "id": "CVE-2021-22390" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22390" } ] }, "cve": "CVE-2021-22390", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22390", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380825", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22390", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22390", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-108", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380825", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22390", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380825" }, { "db": "VULMON", "id": "CVE-2021-22390" }, { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "NVD", "id": "CVE-2021-22390" }, { "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. Huawei A vulnerability exists in smartphones regarding the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22390" }, { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "VULHUB", "id": "VHN-380825" }, { "db": "VULMON", "id": "CVE-2021-22390" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22390", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010873", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-108", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380825", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22390", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380825" }, { "db": "VULMON", "id": "CVE-2021-22390" }, { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "NVD", "id": "CVE-2021-22390" }, { "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "id": "VAR-202108-2204", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380825" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:25.460000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22390", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159078" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-119", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380825" }, { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "NVD", "id": "CVE-2021-22390" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22390" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380825" }, { "db": "VULMON", "id": "CVE-2021-22390" }, { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "NVD", "id": "CVE-2021-22390" }, { "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380825" }, { "db": "VULMON", "id": "CVE-2021-22390" }, { "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "db": "NVD", "id": "CVE-2021-22390" }, { "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380825" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22390" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "date": "2021-08-02T17:15:13.933000", "db": "NVD", "id": "CVE-2021-22390" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380825" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22390" }, { "date": "2022-07-11T05:34:00", "db": "JVNDB", "id": "JVNDB-2021-010873" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22390" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-108" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-108" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in using free memory on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010873" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-108" } ], "trust": 0.6 } }
var-202203-0263
Vulnerability from variot
There is an integer underflow vulnerability in the atcmdserver module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI and Magic UI Exists in an integer underflow vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0263", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "NVD", "id": "CVE-2021-40054" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40054" } ] }, "cve": "CVE-2021-40054", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40054", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401455", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40054", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40054", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-981", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401455", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401455" }, { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "NVD", "id": "CVE-2021-40054" }, { "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an integer underflow vulnerability in the atcmdserver module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI and Magic UI Exists in an integer underflow vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40054" }, { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "VULHUB", "id": "VHN-401455" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40054", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018710", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-981", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401455", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401455" }, { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "NVD", "id": "CVE-2021-40054" }, { "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "id": "VAR-202203-0263", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401455" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:22.877000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Fixes for digital error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186010" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-191", "trust": 1.1 }, { "problemtype": "Integer underflow (CWE-191) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401455" }, { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "NVD", "id": "CVE-2021-40054" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40054" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40054/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401455" }, { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "NVD", "id": "CVE-2021-40054" }, { "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401455" }, { "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "db": "NVD", "id": "CVE-2021-40054" }, { "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401455" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "date": "2022-03-10T17:43:20.147000", "db": "NVD", "id": "CVE-2021-40054" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401455" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018710" }, { "date": "2022-03-14T15:51:06.307000", "db": "NVD", "id": "CVE-2021-40054" }, { "date": "2022-03-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-981" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-981" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Integer Underflow Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018710" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "digital error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-981" } ], "trust": 0.6 } }
var-202108-2287
Vulnerability from variot
There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2287", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22395" } ] }, "cve": "CVE-2021-22395", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22395", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380830", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22395", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22395", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-2827", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380830", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "VULHUB", "id": "VHN-380830" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22395", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018586", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2827", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380830", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "id": "VAR-202108-2287", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380830" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:20.266000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202108-0000001181125881 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172026" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22395" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22395/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380830" }, { "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "db": "NVD", "id": "CVE-2021-22395" }, { "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380830" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "date": "2022-02-25T19:15:09.070000", "db": "NVD", "id": "CVE-2021-22395" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380830" }, { "date": "2023-06-30T08:27:00", "db": "JVNDB", "id": "JVNDB-2021-018586" }, { "date": "2022-03-07T17:44:53.277000", "db": "NVD", "id": "CVE-2021-22395" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2827" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2827" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Code injection vulnerabilities in products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018586" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2827" } ], "trust": 0.6 } }
var-202209-1235
Vulnerability from variot
Buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability will affect the confidentiality and integrity of trusted components. Huawei of EMUI and Magic UI Exists in a classic buffer overflow vulnerability.Information may be obtained and information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-1235", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "NVD", "id": "CVE-2022-39003" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39003" } ] }, "cve": "CVE-2022-39003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-39003", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39003", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202209-1276", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "NVD", "id": "CVE-2022-39003" }, { "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability will affect the confidentiality and integrity of trusted components. Huawei of EMUI and Magic UI Exists in a classic buffer overflow vulnerability.Information may be obtained and information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2022-39003" }, { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "VULHUB", "id": "VHN-434774" }, { "db": "VULMON", "id": "CVE-2022-39003" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39003", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017591", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-1276", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-434774", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39003", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434774" }, { "db": "VULMON", "id": "CVE-2022-39003" }, { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "NVD", "id": "CVE-2022-39003" }, { "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "id": "VAR-202209-1235", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-434774" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:18.432000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208631" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-434774" }, { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "NVD", "id": "CVE-2022-39003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39003" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39003/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-434774" }, { "db": "VULMON", "id": "CVE-2022-39003" }, { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "NVD", "id": "CVE-2022-39003" }, { "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-434774" }, { "db": "VULMON", "id": "CVE-2022-39003" }, { "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "db": "NVD", "id": "CVE-2022-39003" }, { "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-434774" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39003" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "date": "2022-09-16T18:15:18.013000", "db": "NVD", "id": "CVE-2022-39003" }, { "date": "2022-09-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-434774" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39003" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017591" }, { "date": "2022-09-21T12:40:40.990000", "db": "NVD", "id": "CVE-2022-39003" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-1276" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1276" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Classic buffer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017591" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-1276" } ], "trust": 0.6 } }
var-202106-0599
Vulnerability from variot
There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality,availability and integrity. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0599", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22375" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22375" } ] }, "cve": "CVE-2021-22375", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380810", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22375", "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22375", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-1984", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380810", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22375", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380810" }, { "db": "VULMON", "id": "CVE-2021-22375" }, { "db": "NVD", "id": "CVE-2021-22375" }, { "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Key Management Errors Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality,availability and integrity. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22375" }, { "db": "VULHUB", "id": "VHN-380810" }, { "db": "VULMON", "id": "CVE-2021-22375" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22375", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1984", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380810", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22375", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380810" }, { "db": "VULMON", "id": "CVE-2021-22375" }, { "db": "NVD", "id": "CVE-2021-22375" }, { "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "id": "VAR-202106-0599", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380810" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:22.799000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156068" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22375" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380810" }, { "db": "VULMON", "id": "CVE-2021-22375" }, { "db": "NVD", "id": "CVE-2021-22375" }, { "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380810" }, { "db": "VULMON", "id": "CVE-2021-22375" }, { "db": "NVD", "id": "CVE-2021-22375" }, { "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380810" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22375" }, { "date": "2021-06-30T14:15:08.657000", "db": "NVD", "id": "CVE-2021-22375" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380810" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22375" }, { "date": "2021-07-06T15:21:48.367000", "db": "NVD", "id": "CVE-2021-22375" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1984" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1984" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1984" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1984" } ], "trust": 0.6 } }
var-202201-1042
Vulnerability from variot
There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. Huawei HarmonyOS , EMUI , Magic UI contains a type confusion vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has a security vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1042", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40037" } ] }, "cve": "CVE-2021-40037", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 4.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40037", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-401438", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40037", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40037", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-279", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401438", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart. Huawei HarmonyOS , EMUI , Magic UI contains a type confusion vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has a security vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "VULHUB", "id": "VHN-401438" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40037", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002909", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-279", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-04994", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401438", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "id": "VAR-202201-1042", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401438" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:05.119000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177445" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-843", "trust": 1.1 }, { "problemtype": "Mistake of type (CWE-843) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40037" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401438" }, { "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "db": "NVD", "id": "CVE-2021-40037" }, { "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401438" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "date": "2022-01-10T14:10:22.520000", "db": "NVD", "id": "CVE-2021-40037" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401438" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002909" }, { "date": "2022-01-13T15:33:36.160000", "db": "NVD", "id": "CVE-2021-40037" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-279" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-279" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product type mix-up vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002909" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-279" } ], "trust": 0.6 } }
var-202110-1486
Vulnerability from variot
There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions. Huawei Smartphones are vulnerable to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1486", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "NVD", "id": "CVE-2021-36990" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36990" } ] }, "cve": "CVE-2021-36990", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36990", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398823", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-36990", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36990", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2088", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398823", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398823" }, { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "NVD", "id": "CVE-2021-36990" }, { "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions. Huawei Smartphones are vulnerable to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36990" }, { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "VULHUB", "id": "VHN-398823" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36990", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014269", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2088", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398823", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398823" }, { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "NVD", "id": "CVE-2021-36990" }, { "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "id": "VAR-202110-1486", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398823" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:50.122000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36990", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171616" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398823" }, { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "NVD", "id": "CVE-2021-36990" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36990" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398823" }, { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "NVD", "id": "CVE-2021-36990" }, { "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398823" }, { "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "db": "NVD", "id": "CVE-2021-36990" }, { "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398823" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "date": "2021-10-28T13:15:10.573000", "db": "NVD", "id": "CVE-2021-36990" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398823" }, { "date": "2022-10-11T09:03:00", "db": "JVNDB", "id": "JVNDB-2021-014269" }, { "date": "2021-11-01T23:13:58.830000", "db": "NVD", "id": "CVE-2021-36990" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2088" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2088" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Improper Default Permission Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014269" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2088" } ], "trust": 0.6 } }
var-202106-1918
Vulnerability from variot
There is a Credentials Management Errors vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. Huawei Smartphones are vulnerable to inadequate protection of credentials.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have an authorization issue vulnerability, which stems from the lack of authentication measures or insufficient authentication strength in the product
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1918", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "NVD", "id": "CVE-2021-22324" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22324" } ] }, "cve": "CVE-2021-22324", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22324", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380759", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22324", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22324", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-235", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380759", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380759" }, { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "NVD", "id": "CVE-2021-22324" }, { "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Credentials Management Errors vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. Huawei Smartphones are vulnerable to inadequate protection of credentials.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have an authorization issue vulnerability, which stems from the lack of authentication measures or insufficient authentication strength in the product", "sources": [ { "db": "NVD", "id": "CVE-2021-22324" }, { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "VULHUB", "id": "VHN-380759" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22324", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007567", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-235", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380759", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380759" }, { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "NVD", "id": "CVE-2021-22324" }, { "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "id": "VAR-202106-1918", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380759" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:24.622000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0March\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" }, { "title": "Repair measures for Huawei smartphone authorization bugs", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153897" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Inadequate protection of credentials (CWE-522) [NVD Evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-522", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380759" }, { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "NVD", "id": "CVE-2021-22324" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/3/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22324" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380759" }, { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "NVD", "id": "CVE-2021-22324" }, { "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380759" }, { "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "db": "NVD", "id": "CVE-2021-22324" }, { "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380759" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "date": "2021-06-03T17:15:07.423000", "db": "NVD", "id": "CVE-2021-22324" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380759" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007567" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22324" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-235" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-235" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in insufficient protection of authentication information on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007567" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-235" } ], "trust": 0.6 } }
var-202107-0338
Vulnerability from variot
There is a Missing Cryptographic Step vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS of Samgr. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202107-0338", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "8.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "8.2" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9158" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9158" } ] }, "cve": "CVE-2020-9158", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-187283", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2020-9158", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9158", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202107-032", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-187283", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-9158", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187283" }, { "db": "VULMON", "id": "CVE-2020-9158" }, { "db": "NVD", "id": "CVE-2020-9158" }, { "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Missing Cryptographic Step vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS of Samgr. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2020-9158" }, { "db": "VULHUB", "id": "VHN-187283" }, { "db": "VULMON", "id": "CVE-2020-9158" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9158", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202107-032", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-187283", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-9158", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187283" }, { "db": "VULMON", "id": "CVE-2020-9158" }, { "db": "NVD", "id": "CVE-2020-9158" }, { "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "id": "VAR-202107-0338", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187283" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:35.422000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156101" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9158" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/1/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187283" }, { "db": "VULMON", "id": "CVE-2020-9158" }, { "db": "NVD", "id": "CVE-2020-9158" }, { "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187283" }, { "db": "VULMON", "id": "CVE-2020-9158" }, { "db": "NVD", "id": "CVE-2020-9158" }, { "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-01T00:00:00", "db": "VULHUB", "id": "VHN-187283" }, { "date": "2021-07-01T00:00:00", "db": "VULMON", "id": "CVE-2020-9158" }, { "date": "2021-07-01T12:15:07.477000", "db": "NVD", "id": "CVE-2020-9158" }, { "date": "2021-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-187283" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2020-9158" }, { "date": "2021-07-06T21:01:19.730000", "db": "NVD", "id": "CVE-2020-9158" }, { "date": "2021-07-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202107-032" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-032" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-032" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202107-032" } ], "trust": 0.6 } }
var-202106-0615
Vulnerability from variot
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the kernel to restart. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There is a security vulnerability in Huawei smartphones
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0615", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22353" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22353" } ] }, "cve": "CVE-2021-22353", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380788", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22353", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22353", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-2000", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380788", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22353", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380788" }, { "db": "VULMON", "id": "CVE-2021-22353" }, { "db": "NVD", "id": "CVE-2021-22353" }, { "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the kernel to restart. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. There is a security vulnerability in Huawei smartphones", "sources": [ { "db": "NVD", "id": "CVE-2021-22353" }, { "db": "VULHUB", "id": "VHN-380788" }, { "db": "VULMON", "id": "CVE-2021-22353" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22353", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2000", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380788", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22353", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380788" }, { "db": "VULMON", "id": "CVE-2021-22353" }, { "db": "NVD", "id": "CVE-2021-22353" }, { "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "id": "VAR-202106-0615", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380788" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:25.724000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for Huawei smartphone buffer error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156080" }, { "title": "CVE-2021-22353", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22353 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22353" }, { "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380788" }, { "db": "NVD", "id": "CVE-2021-22353" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22353" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22353" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380788" }, { "db": "VULMON", "id": "CVE-2021-22353" }, { "db": "NVD", "id": "CVE-2021-22353" }, { "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380788" }, { "db": "VULMON", "id": "CVE-2021-22353" }, { "db": "NVD", "id": "CVE-2021-22353" }, { "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380788" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22353" }, { "date": "2021-06-30T18:15:08.437000", "db": "NVD", "id": "CVE-2021-22353" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380788" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22353" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22353" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2000" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2000" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2000" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2000" } ], "trust": 0.6 } }
var-202108-2214
Vulnerability from variot
There is a Memory Buffer Errors Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2214", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "8.2" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "8.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22414" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22414" } ] }, "cve": "CVE-2021-22414", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380849", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22414", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22414", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-116", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380849", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22414", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380849" }, { "db": "VULMON", "id": "CVE-2021-22414" }, { "db": "NVD", "id": "CVE-2021-22414" }, { "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Errors Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-22414" }, { "db": "VULHUB", "id": "VHN-380849" }, { "db": "VULMON", "id": "CVE-2021-22414" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22414", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-116", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380849", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22414", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380849" }, { "db": "VULMON", "id": "CVE-2021-22414" }, { "db": "NVD", "id": "CVE-2021-22414" }, { "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "id": "VAR-202108-2214", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380849" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:04.829000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159188" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380849" }, { "db": "NVD", "id": "CVE-2021-22414" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22414" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380849" }, { "db": "VULMON", "id": "CVE-2021-22414" }, { "db": "NVD", "id": "CVE-2021-22414" }, { "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380849" }, { "db": "VULMON", "id": "CVE-2021-22414" }, { "db": "NVD", "id": "CVE-2021-22414" }, { "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380849" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22414" }, { "date": "2021-08-02T17:15:14.313000", "db": "NVD", "id": "CVE-2021-22414" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380849" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22414" }, { "date": "2021-12-09T17:55:10.537000", "db": "NVD", "id": "CVE-2021-22414" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-116" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-116" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-116" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-116" } ], "trust": 0.6 } }
var-202108-2209
Vulnerability from variot
There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei EMUI/Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2209", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22446" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22446" } ] }, "cve": "CVE-2021-22446", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380881", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22446", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22446", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-131", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380881", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22446", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380881" }, { "db": "VULMON", "id": "CVE-2021-22446" }, { "db": "NVD", "id": "CVE-2021-22446" }, { "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). There is a security vulnerability in Huawei EMUI/Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-22446" }, { "db": "VULHUB", "id": "VHN-380881" }, { "db": "VULMON", "id": "CVE-2021-22446" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22446", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-131", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380881", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22446", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380881" }, { "db": "VULMON", "id": "CVE-2021-22446" }, { "db": "NVD", "id": "CVE-2021-22446" }, { "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "id": "VAR-202108-2209", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380881" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:38.292000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159193" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380881" }, { "db": "NVD", "id": "CVE-2021-22446" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22446" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/668.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380881" }, { "db": "VULMON", "id": "CVE-2021-22446" }, { "db": "NVD", "id": "CVE-2021-22446" }, { "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380881" }, { "db": "VULMON", "id": "CVE-2021-22446" }, { "db": "NVD", "id": "CVE-2021-22446" }, { "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380881" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22446" }, { "date": "2021-08-02T18:15:08.607000", "db": "NVD", "id": "CVE-2021-22446" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-380881" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22446" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-22446" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-131" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-131" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei Smartphone Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-131" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-131" } ], "trust": 0.6 } }
var-202202-0419
Vulnerability from variot
There is a permission verification vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may cause unauthorized operations. EMUI and Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Emui is an Android-based mobile operating system developed by China's Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0419", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "NVD", "id": "CVE-2021-40044" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40044" } ] }, "cve": "CVE-2021-40044", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Adjacent Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40044", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.5, "id": "VHN-401445", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:A/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40044", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40044", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202202-861", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401445", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401445" }, { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "NVD", "id": "CVE-2021-40044" }, { "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a permission verification vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may cause unauthorized operations. EMUI and Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Emui is an Android-based mobile operating system developed by China\u0027s Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-40044" }, { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "VULHUB", "id": "VHN-401445" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40044", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005384", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-861", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-12804", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401445", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401445" }, { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "NVD", "id": "CVE-2021-40044" }, { "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "id": "VAR-202202-0419", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401445" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:47.033000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "title": "Huawei EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=184121" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "others (CWE-Other) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "NVD", "id": "CVE-2021-40044" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40044" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401445" }, { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "NVD", "id": "CVE-2021-40044" }, { "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401445" }, { "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "db": "NVD", "id": "CVE-2021-40044" }, { "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401445" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "date": "2022-02-09T23:15:16.357000", "db": "NVD", "id": "CVE-2021-40044" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-401445" }, { "date": "2023-05-30T04:49:00", "db": "JVNDB", "id": "JVNDB-2022-005384" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-40044" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-861" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-861" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005384" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-861" } ], "trust": 0.6 } }
var-202202-1522
Vulnerability from variot
There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access. EMUI and Magic UI includes an integer overflow vulnerability, and Time-of-check Time-of-use (TOCTOU) There is a race condition vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1522", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "NVD", "id": "CVE-2021-22437" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22437" } ] }, "cve": "CVE-2021-22437", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.9, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22437", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-380872", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.0, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.0, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22437", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22437", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202202-2074", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380872", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380872" }, { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "NVD", "id": "CVE-2021-22437" }, { "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access. EMUI and Magic UI includes an integer overflow vulnerability, and Time-of-check Time-of-use (TOCTOU) There is a race condition vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22437" }, { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "VULHUB", "id": "VHN-380872" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22437", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-006525", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-2074", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380872", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380872" }, { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "NVD", "id": "CVE-2021-22437" }, { "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "id": "VAR-202202-1522", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380872" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:38.545000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185119" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "Time-of-check Time-of-use (TOCTOU) Race condition (CWE-367) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-367", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380872" }, { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "NVD", "id": "CVE-2021-22437" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22437" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22437/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380872" }, { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "NVD", "id": "CVE-2021-22437" }, { "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380872" }, { "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "db": "NVD", "id": "CVE-2021-22437" }, { "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380872" }, { "date": "2023-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "date": "2022-02-25T19:15:10.470000", "db": "NVD", "id": "CVE-2021-22437" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380872" }, { "date": "2023-07-06T01:26:00", "db": "JVNDB", "id": "JVNDB-2022-006525" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-22437" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2074" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2074" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-006525" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2074" } ], "trust": 0.6 } }
var-202106-1923
Vulnerability from variot
There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause leaking of user click data. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1923", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "NVD", "id": "CVE-2021-22337" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22337" } ] }, "cve": "CVE-2021-22337", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22337", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380772", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-22337", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22337", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-251", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-380772", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380772" }, { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "NVD", "id": "CVE-2021-22337" }, { "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause leaking of user click data. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22337" }, { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "VULHUB", "id": "VHN-380772" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22337", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007573", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-251", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380772", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380772" }, { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "NVD", "id": "CVE-2021-22337" }, { "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "id": "VAR-202106-1923", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380772" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:57:21.246000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0April\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "title": "HuaWei Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=152911" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "NVD", "id": "CVE-2021-22337" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22337" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380772" }, { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "NVD", "id": "CVE-2021-22337" }, { "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380772" }, { "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "db": "NVD", "id": "CVE-2021-22337" }, { "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380772" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "date": "2021-06-03T20:15:08.530000", "db": "NVD", "id": "CVE-2021-22337" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380772" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007573" }, { "date": "2021-12-09T17:57:49.963000", "db": "NVD", "id": "CVE-2021-22337" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-251" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-251" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007573" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-251" } ], "trust": 0.6 } }
var-202104-1918
Vulnerability from variot
An application bypass mechanism vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to delete user SMS messages. Huawei There are unspecified vulnerabilities in smartphones.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202104-1918", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "NVD", "id": "CVE-2020-9148" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9148" } ] }, "cve": "CVE-2020-9148", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9148", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-187273", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9148", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9148", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202104-024", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-187273", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-9148", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187273" }, { "db": "VULMON", "id": "CVE-2020-9148" }, { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "NVD", "id": "CVE-2020-9148" }, { "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An application bypass mechanism vulnerability exists in a component interface of Huawei Smartphone. Local attackers can exploit this vulnerability to delete user SMS messages. Huawei There are unspecified vulnerabilities in smartphones.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2020-9148" }, { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "VULHUB", "id": "VHN-187273" }, { "db": "VULMON", "id": "CVE-2020-9148" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9148", "trust": 2.6 }, { "db": "JVNDB", "id": "JVNDB-2020-016440", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202104-024", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-187273", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-9148", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187273" }, { "db": "VULMON", "id": "CVE-2020-9148" }, { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "NVD", "id": "CVE-2020-9148" }, { "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "id": "VAR-202104-1918", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187273" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:18.753000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0 Security update \u00a02021 Year 1 Moon", "trust": 0.8, "url": "https://consumer.huawei.com/jp/support/bulletin/2021/1/" }, { "title": "Huawei Emui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=146443" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "NVD", "id": "CVE-2020-9148" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/cn/support/bulletin/2021/1" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9148" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187273" }, { "db": "VULMON", "id": "CVE-2020-9148" }, { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "NVD", "id": "CVE-2020-9148" }, { "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187273" }, { "db": "VULMON", "id": "CVE-2020-9148" }, { "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "db": "NVD", "id": "CVE-2020-9148" }, { "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-04-01T00:00:00", "db": "VULHUB", "id": "VHN-187273" }, { "date": "2021-04-01T00:00:00", "db": "VULMON", "id": "CVE-2020-9148" }, { "date": "2021-12-03T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "date": "2021-04-01T18:15:12.480000", "db": "NVD", "id": "CVE-2020-9148" }, { "date": "2021-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-187273" }, { "date": "2021-04-05T00:00:00", "db": "VULMON", "id": "CVE-2020-9148" }, { "date": "2021-12-03T09:05:00", "db": "JVNDB", "id": "JVNDB-2020-016440" }, { "date": "2021-12-09T17:57:49.850000", "db": "NVD", "id": "CVE-2020-9148" }, { "date": "2021-04-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202104-024" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-024" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-016440" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202104-024" } ], "trust": 0.6 } }
var-202112-0285
Vulnerability from variot
There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting. plural Huawei Smartphone products contain an argument injection or modification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. No detailed vulnerability details were provided at this time
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0285", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37040" } ] }, "cve": "CVE-2021-37040", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37040", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-398873", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37040", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37040", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2050", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398873", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting. plural Huawei Smartphone products contain an argument injection or modification vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS. No detailed vulnerability details were provided at this time", "sources": [ { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "VULHUB", "id": "VHN-398873" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37040", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015891", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2050", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08329", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398873", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "id": "VAR-202112-0285", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398873" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.416000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Parameter\u00a0injection\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Repair measures for injecting vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173803" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-88", "trust": 1.1 }, { "problemtype": "Insert or change arguments (CWE-88) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-74", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37040" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398873" }, { "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "db": "NVD", "id": "CVE-2021-37040" }, { "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398873" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "date": "2021-12-08T15:15:09.267000", "db": "NVD", "id": "CVE-2021-37040" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398873" }, { "date": "2022-12-01T07:34:00", "db": "JVNDB", "id": "JVNDB-2021-015891" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37040" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2050" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2050" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Argument insertion or modification vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015891" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "parameter injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2050" } ], "trust": 0.6 } }
var-202201-0227
Vulnerability from variot
There is a Double free vulnerability in Smartphone.Successful exploitation of this vulnerability may cause a kernel crash or privilege escalation. EMUI and Magic UI contains a double free vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). The Huawei Smartphone has a buffer error vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-0227", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "NVD", "id": "CVE-2021-37120" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37120" } ] }, "cve": "CVE-2021-37120", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-37120", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-398957", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37120", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37120", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202201-080", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398957", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398957" }, { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "NVD", "id": "CVE-2021-37120" }, { "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Double free vulnerability in Smartphone.Successful exploitation of this vulnerability may cause a kernel crash or privilege escalation. EMUI and Magic UI contains a double free vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). The Huawei Smartphone has a buffer error vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-37120" }, { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "VULHUB", "id": "VHN-398957" }, { "db": "VULMON", "id": "CVE-2021-37120" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37120", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-002916", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-080", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-05167", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398957", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37120", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398957" }, { "db": "VULMON", "id": "CVE-2021-37120" }, { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "NVD", "id": "CVE-2021-37120" }, { "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "id": "VAR-202201-0227", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398957" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:16.087000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0October\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176748" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398957" }, { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "NVD", "id": "CVE-2021-37120" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37120" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398957" }, { "db": "VULMON", "id": "CVE-2021-37120" }, { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "NVD", "id": "CVE-2021-37120" }, { "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398957" }, { "db": "VULMON", "id": "CVE-2021-37120" }, { "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "db": "NVD", "id": "CVE-2021-37120" }, { "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398957" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37120" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "date": "2022-01-03T22:15:09.500000", "db": "NVD", "id": "CVE-2021-37120" }, { "date": "2022-01-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-398957" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37120" }, { "date": "2023-01-27T05:21:00", "db": "JVNDB", "id": "JVNDB-2022-002916" }, { "date": "2022-01-13T15:54:39.633000", "db": "NVD", "id": "CVE-2021-37120" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-080" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-080" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Double release vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002916" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-080" } ], "trust": 0.6 } }
var-202202-0615
Vulnerability from variot
There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality. EMUI , HarmonyOS , Magic UI Exists in a digital signature verification vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0615", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40045" } ] }, "cve": "CVE-2021-40045", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40045", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-401446", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40045", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40045", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202202-442", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401446", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2021-40045", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality. EMUI , HarmonyOS , Magic UI Exists in a digital signature verification vulnerability.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40045", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-005383", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-442", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401446", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40045", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "id": "VAR-202202-0615", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401446" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T22:37:14.969000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202202-0000001204253396 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "title": "Huawei HarmonyOS Repair measures for data forgery problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=182401" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-347", "trust": 1.1 }, { "problemtype": "Improper verification of digital signatures (CWE-347) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40045" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202202-0000001203413350" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/347.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401446" }, { "db": "VULMON", "id": "CVE-2021-40045" }, { "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "db": "CNNVD", "id": "CNNVD-202202-442" }, { "db": "NVD", "id": "CVE-2021-40045" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401446" }, { "date": "2022-02-09T00:00:00", "db": "VULMON", "id": "CVE-2021-40045" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "date": "2022-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-442" }, { "date": "2022-02-09T23:15:16.397000", "db": "NVD", "id": "CVE-2021-40045" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-16T00:00:00", "db": "VULHUB", "id": "VHN-401446" }, { "date": "2022-02-16T00:00:00", "db": "VULMON", "id": "CVE-2021-40045" }, { "date": "2023-05-30T04:45:00", "db": "JVNDB", "id": "JVNDB-2022-005383" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-442" }, { "date": "2022-02-16T02:33:08.603000", "db": "NVD", "id": "CVE-2021-40045" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-442" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Digital Signature Verification Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005383" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "data forgery", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-442" } ], "trust": 0.6 } }
var-202202-1399
Vulnerability from variot
There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability. EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1399", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40015" } ] }, "cve": "CVE-2021-40015", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 1.9, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40015", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "exploitabilityScore": 3.4, "id": "VHN-401416", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.0, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 4.7, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40015", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40015", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202202-443", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401416", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability. EMUI , HarmonyOS , Magic UI There is a race condition vulnerability in.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in Huawei HarmonyOS", "sources": [ { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "VULHUB", "id": "VHN-401416" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40015", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-005385", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-443", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401416", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "id": "VAR-202202-1399", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401416" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:15:51.678000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202202-0000001204253396 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "title": "Huawei HarmonyOS Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=182402" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40015" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202202-0000001203413350" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401416" }, { "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "db": "NVD", "id": "CVE-2021-40015" }, { "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-09T00:00:00", "db": "VULHUB", "id": "VHN-401416" }, { "date": "2023-05-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "date": "2022-02-09T23:15:16.313000", "db": "NVD", "id": "CVE-2021-40015" }, { "date": "2022-02-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-16T00:00:00", "db": "VULHUB", "id": "VHN-401416" }, { "date": "2023-05-30T04:58:00", "db": "JVNDB", "id": "JVNDB-2022-005385" }, { "date": "2022-02-16T02:19:28.473000", "db": "NVD", "id": "CVE-2021-40015" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-443" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-443" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product race condition vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-005385" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-443" } ], "trust": 0.6 } }
var-202203-0971
Vulnerability from variot
There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0971", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40051" } ] }, "cve": "CVE-2021-40051", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40051", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401452", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40051", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40051", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-987", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401452", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "VULHUB", "id": "VHN-401452" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40051", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018713", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-987", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401452", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "id": "VAR-202203-0971", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401452" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:12.661000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186014" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40051" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40051/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401452" }, { "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "db": "NVD", "id": "CVE-2021-40051" }, { "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401452" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "date": "2022-03-10T17:43:18.447000", "db": "NVD", "id": "CVE-2021-40051" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401452" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018713" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-40051" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-987" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-987" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to resource disclosure to the wrong area in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018713" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-987" } ], "trust": 0.6 } }
var-202108-2288
Vulnerability from variot
There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2288", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22489" } ] }, "cve": "CVE-2021-22489", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22489", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380924", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22489", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22489", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-2826", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380924", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability. EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "VULHUB", "id": "VHN-380924" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22489", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018971", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-2826", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380924", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "id": "VAR-202108-2288", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380924" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:25.414000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202108-0000001181125881 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172020" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22489" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22489/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380924" }, { "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "db": "NVD", "id": "CVE-2021-22489" }, { "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380924" }, { "date": "2023-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "date": "2022-02-25T19:15:11.340000", "db": "NVD", "id": "CVE-2021-22489" }, { "date": "2021-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-08T00:00:00", "db": "VULHUB", "id": "VHN-380924" }, { "date": "2023-07-12T07:22:00", "db": "JVNDB", "id": "JVNDB-2021-018971" }, { "date": "2022-03-08T13:52:39.587000", "db": "NVD", "id": "CVE-2021-22489" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-2826" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2826" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018971" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-2826" } ], "trust": 0.6 } }
var-202110-1490
Vulnerability from variot
There is a Code injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may exhaust system resources and cause the system to restart. Huawei Smartphones have a code injection vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1490", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "NVD", "id": "CVE-2021-36985" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36985" } ] }, "cve": "CVE-2021-36985", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36985", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398817", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36985", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36985", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2082", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398817", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398817" }, { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "NVD", "id": "CVE-2021-36985" }, { "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Code injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may exhaust system resources and cause the system to restart. Huawei Smartphones have a code injection vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-36985" }, { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "VULHUB", "id": "VHN-398817" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36985", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014309", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2082", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398817", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398817" }, { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "NVD", "id": "CVE-2021-36985" }, { "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "id": "VAR-202110-1490", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398817" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:16.097000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36985", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Fixes for code injection vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171583" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-770", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398817" }, { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "NVD", "id": "CVE-2021-36985" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36985" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398817" }, { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "NVD", "id": "CVE-2021-36985" }, { "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398817" }, { "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "db": "NVD", "id": "CVE-2021-36985" }, { "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398817" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "date": "2021-10-28T13:15:10.357000", "db": "NVD", "id": "CVE-2021-36985" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-398817" }, { "date": "2022-10-12T08:25:00", "db": "JVNDB", "id": "JVNDB-2021-014309" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-36985" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2082" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2082" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Code injection vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014309" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2082" } ], "trust": 0.6 } }
var-202201-1017
Vulnerability from variot
There is an Out-of-bounds array read vulnerability in the security storage module in smartphones. Successful exploitation of this vulnerability may affect service confidentiality. EMUI and Magic UI Exists in an out-of-bounds read vulnerability.Information may be obtained. The Huawei Smartphone is a smartphone from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1017", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "NVD", "id": "CVE-2021-40020" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40020" } ] }, "cve": "CVE-2021-40020", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40020", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-12805", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401421", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40020", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40020", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2022-12805", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-567", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401421", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "VULHUB", "id": "VHN-401421" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "NVD", "id": "CVE-2021-40020" }, { "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds array read vulnerability in the security storage module in smartphones. Successful exploitation of this vulnerability may affect service confidentiality. EMUI and Magic UI Exists in an out-of-bounds read vulnerability.Information may be obtained. The Huawei Smartphone is a smartphone from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-40020" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "VULHUB", "id": "VHN-401421" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40020", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-002903", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-12805", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-567", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401421", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "VULHUB", "id": "VHN-401421" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "NVD", "id": "CVE-2021-40020" }, { "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "id": "VAR-202201-1017", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "VULHUB", "id": "VHN-401421" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" } ] }, "last_update_date": "2023-12-18T12:16:00.206000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0January\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "title": "Patch for Huawei Smartphone Buffer Overflow Vulnerability (CNVD-2022-12805)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/321021" }, { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178043" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401421" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "NVD", "id": "CVE-2021-40020" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40020" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "VULHUB", "id": "VHN-401421" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "NVD", "id": "CVE-2021-40020" }, { "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-12805" }, { "db": "VULHUB", "id": "VHN-401421" }, { "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "db": "NVD", "id": "CVE-2021-40020" }, { "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-20T00:00:00", "db": "CNVD", "id": "CNVD-2022-12805" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401421" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "date": "2022-01-10T14:10:21.557000", "db": "NVD", "id": "CVE-2021-40020" }, { "date": "2022-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-21T00:00:00", "db": "CNVD", "id": "CNVD-2022-12805" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401421" }, { "date": "2023-01-25T09:02:00", "db": "JVNDB", "id": "JVNDB-2022-002903" }, { "date": "2022-01-13T03:12:21.883000", "db": "NVD", "id": "CVE-2021-40020" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-567" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-567" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Out-of-bounds read vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002903" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-567" } ], "trust": 0.6 } }
var-202111-1583
Vulnerability from variot
There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are remote DoS vulnerabilities in Huawei Emui and Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1583", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "NVD", "id": "CVE-2021-37035" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37035" } ] }, "cve": "CVE-2021-37035", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37035", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398868", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37035", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37035", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1898", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398868", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398868" }, { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "NVD", "id": "CVE-2021-37035" }, { "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are remote DoS vulnerabilities in Huawei Emui and Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-37035" }, { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "VULHUB", "id": "VHN-398868" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37035", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015511", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1898", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102862", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398868", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398868" }, { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "NVD", "id": "CVE-2021-37035" }, { "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "id": "VAR-202111-1583", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398868" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:19.919000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "Huawei Emui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172195" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "NVD", "id": "CVE-2021-37035" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37035" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398868" }, { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "NVD", "id": "CVE-2021-37035" }, { "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398868" }, { "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "db": "NVD", "id": "CVE-2021-37035" }, { "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398868" }, { "date": "2022-11-22T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "date": "2021-11-23T16:15:09.933000", "db": "NVD", "id": "CVE-2021-37035" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398868" }, { "date": "2022-11-22T09:09:00", "db": "JVNDB", "id": "JVNDB-2021-015511" }, { "date": "2021-12-09T17:57:49.680000", "db": "NVD", "id": "CVE-2021-37035" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1898" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1898" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015511" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1898" } ], "trust": 0.6 } }
var-202110-1502
Vulnerability from variot
There is an Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have an authentication vulnerability.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1502", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "NVD", "id": "CVE-2021-22473" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22473" } ] }, "cve": "CVE-2021-22473", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22473", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380908", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22473", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22473", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2067", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380908", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380908" }, { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "NVD", "id": "CVE-2021-22473" }, { "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have an authentication vulnerability.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22473" }, { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "VULHUB", "id": "VHN-380908" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22473", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014321", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2067", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380908", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380908" }, { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "NVD", "id": "CVE-2021-22473" }, { "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "id": "VAR-202110-1502", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380908" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:49:02.287000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22473", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Wearables Remediation measures for authorization problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171559" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-287", "trust": 1.1 }, { "problemtype": "Inappropriate authentication (CWE-287) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380908" }, { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "NVD", "id": "CVE-2021-22473" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22473" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380908" }, { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "NVD", "id": "CVE-2021-22473" }, { "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380908" }, { "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "db": "NVD", "id": "CVE-2021-22473" }, { "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380908" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "date": "2021-10-28T13:15:09.790000", "db": "NVD", "id": "CVE-2021-22473" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380908" }, { "date": "2022-10-12T08:53:00", "db": "JVNDB", "id": "JVNDB-2021-014321" }, { "date": "2021-11-02T00:14:32.057000", "db": "NVD", "id": "CVE-2021-22473" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2067" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2067" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Authentication Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014321" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "authorization issue", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2067" } ], "trust": 0.6 } }
var-202110-1709
Vulnerability from variot
There is a DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS attacks. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1709", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "NVD", "id": "CVE-2021-22402" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22402" } ] }, "cve": "CVE-2021-22402", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22402", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380837", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22402", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22402", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2033", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380837", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380837" }, { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "NVD", "id": "CVE-2021-22402" }, { "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS attacks. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22402" }, { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "VULHUB", "id": "VHN-380837" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22402", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014173", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2033", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380837", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380837" }, { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "NVD", "id": "CVE-2021-22402" }, { "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "id": "VAR-202110-1709", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380837" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:18.707000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=167715" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "NVD", "id": "CVE-2021-22402" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22402" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380837" }, { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "NVD", "id": "CVE-2021-22402" }, { "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380837" }, { "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "db": "NVD", "id": "CVE-2021-22402" }, { "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380837" }, { "date": "2022-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "date": "2021-10-28T13:15:08.480000", "db": "NVD", "id": "CVE-2021-22402" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380837" }, { "date": "2022-10-06T08:30:00", "db": "JVNDB", "id": "JVNDB-2021-014173" }, { "date": "2021-12-09T17:57:49.577000", "db": "NVD", "id": "CVE-2021-22402" }, { "date": "2021-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2033" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2033" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014173" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2033" } ], "trust": 0.6 } }
var-202110-1847
Vulnerability from variot
There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1847", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37113" } ] }, "cve": "CVE-2021-37113", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37113", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398949", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37113", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37113", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2234", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398949", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. Huawei HarmonyOS has security vulnerabilities", "sources": [ { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37113", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017592", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2234", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-08458", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398949", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37113", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "id": "VAR-202110-1847", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398949" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:41.572000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202110-0000001162998526 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176782" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37113" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-visions-202110-0000001162597918" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398949" }, { "db": "VULMON", "id": "CVE-2021-37113" }, { "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "db": "NVD", "id": "CVE-2021-37113" }, { "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398949" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37113" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "date": "2022-01-03T22:15:09.170000", "db": "NVD", "id": "CVE-2021-37113" }, { "date": "2021-10-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-398949" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37113" }, { "date": "2023-01-27T06:03:00", "db": "JVNDB", "id": "JVNDB-2021-017592" }, { "date": "2022-07-12T17:42:04.277000", "db": "NVD", "id": "CVE-2021-37113" }, { "date": "2022-07-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2234" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2234" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017592" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2234" } ], "trust": 0.6 } }
var-202209-0226
Vulnerability from variot
The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0226", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-38978" } ] }, "cve": "CVE-2022-38978", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-38978", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-38978", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-187", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "VULHUB", "id": "VHN-428505" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-38978", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-016794", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-187", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428505", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428505" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "id": "VAR-202209-0226", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428505" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:39.896000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208088" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-38978" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-38978/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428505" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428505" }, { "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "db": "NVD", "id": "CVE-2022-38978" }, { "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428505" }, { "date": "2023-10-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "date": "2022-09-16T18:15:17.350000", "db": "NVD", "id": "CVE-2022-38978" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-17T00:00:00", "db": "VULHUB", "id": "VHN-428505" }, { "date": "2023-10-06T08:10:00", "db": "JVNDB", "id": "JVNDB-2022-016794" }, { "date": "2022-09-17T03:46:58.527000", "db": "NVD", "id": "CVE-2022-38978" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-187" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-187" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-016794" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-187" } ], "trust": 0.6 } }
var-202108-2206
Vulnerability from variot
There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. Huawei An integer overflow vulnerability exists in smartphones.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2206", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "NVD", "id": "CVE-2021-22388" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22388" } ] }, "cve": "CVE-2021-22388", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22388", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380823", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22388", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22388", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-105", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380823", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22388", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380823" }, { "db": "VULMON", "id": "CVE-2021-22388" }, { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "NVD", "id": "CVE-2021-22388" }, { "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. Huawei An integer overflow vulnerability exists in smartphones.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22388" }, { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "VULHUB", "id": "VHN-380823" }, { "db": "VULMON", "id": "CVE-2021-22388" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22388", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010874", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-105", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380823", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22388", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380823" }, { "db": "VULMON", "id": "CVE-2021-22388" }, { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "NVD", "id": "CVE-2021-22388" }, { "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "id": "VAR-202108-2206", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380823" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:47.480000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22388", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159077" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380823" }, { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "NVD", "id": "CVE-2021-22388" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22388" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/190.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380823" }, { "db": "VULMON", "id": "CVE-2021-22388" }, { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "NVD", "id": "CVE-2021-22388" }, { "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380823" }, { "db": "VULMON", "id": "CVE-2021-22388" }, { "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "db": "NVD", "id": "CVE-2021-22388" }, { "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380823" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22388" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "date": "2021-08-02T17:15:13.833000", "db": "NVD", "id": "CVE-2021-22388" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380823" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22388" }, { "date": "2022-07-11T05:34:00", "db": "JVNDB", "id": "JVNDB-2021-010874" }, { "date": "2021-12-09T17:55:10.150000", "db": "NVD", "id": "CVE-2021-22388" }, { "date": "2021-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-105" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-105" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Integer overflow vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010874" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-105" } ], "trust": 0.6 } }
var-202205-0436
Vulnerability from variot
The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access. Huawei of EMUI , Magic UI , HarmonyOS Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202205-0436", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46786" } ] }, "cve": "CVE-2021-46786", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-46786", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-419298", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-46786", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46786", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202205-2554", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-419298", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The audio module has a vulnerability in verifying the parameters passed by the application space.Successful exploitation of this vulnerability may cause out-of-bounds memory access. Huawei of EMUI , Magic UI , HarmonyOS Exists in a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in the HUAWEI HarmonyOS kernel", "sources": [ { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46786", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-009694", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202205-2554", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-47650", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-419298", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46786", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "id": "VAR-202205-0436", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-419298" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:04.935000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=193775" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46786" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46786/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202205-0000001292610341" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-419298" }, { "db": "VULMON", "id": "CVE-2021-46786" }, { "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "db": "NVD", "id": "CVE-2021-46786" }, { "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-419298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46786" }, { "date": "2023-08-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "date": "2022-05-13T15:15:08.467000", "db": "NVD", "id": "CVE-2021-46786" }, { "date": "2022-05-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-23T00:00:00", "db": "VULHUB", "id": "VHN-419298" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46786" }, { "date": "2023-08-07T08:16:00", "db": "JVNDB", "id": "JVNDB-2022-009694" }, { "date": "2022-05-23T18:48:58.757000", "db": "NVD", "id": "CVE-2021-46786" }, { "date": "2022-05-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202205-2554" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2554" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer error vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-009694" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202205-2554" } ], "trust": 0.6 } }
var-202110-1480
Vulnerability from variot
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of certain virtual information. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1480", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "NVD", "id": "CVE-2021-36996" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36996" } ] }, "cve": "CVE-2021-36996", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36996", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398829", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-36996", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36996", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202110-2095", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398829", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398829" }, { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "NVD", "id": "CVE-2021-36996" }, { "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of certain virtual information. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-36996" }, { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "VULHUB", "id": "VHN-398829" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36996", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014262", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2095", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398829", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398829" }, { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "NVD", "id": "CVE-2021-36996" }, { "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "id": "VAR-202110-1480", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398829" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:11.833000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36996", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168232" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "NVD", "id": "CVE-2021-36996" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36996" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398829" }, { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "NVD", "id": "CVE-2021-36996" }, { "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398829" }, { "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "db": "NVD", "id": "CVE-2021-36996" }, { "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398829" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "date": "2021-10-28T13:15:10.830000", "db": "NVD", "id": "CVE-2021-36996" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398829" }, { "date": "2022-10-11T08:46:00", "db": "JVNDB", "id": "JVNDB-2021-014262" }, { "date": "2021-11-01T21:24:06.690000", "db": "NVD", "id": "CVE-2021-36996" }, { "date": "2021-11-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2095" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2095" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014262" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2095" } ], "trust": 0.6 } }
var-202108-2215
Vulnerability from variot
There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2215", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "8.2" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "8.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22413" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:8.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22413" } ] }, "cve": "CVE-2021-22413", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380848", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22413", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22413", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-114", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380848", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22413", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380848" }, { "db": "VULMON", "id": "CVE-2021-22413" }, { "db": "NVD", "id": "CVE-2021-22413" }, { "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset", "sources": [ { "db": "NVD", "id": "CVE-2021-22413" }, { "db": "VULHUB", "id": "VHN-380848" }, { "db": "VULMON", "id": "CVE-2021-22413" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22413", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-114", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380848", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22413", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380848" }, { "db": "VULMON", "id": "CVE-2021-22413" }, { "db": "NVD", "id": "CVE-2021-22413" }, { "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "id": "VAR-202108-2215", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380848" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:34:56.839000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159187" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "CWE-787", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380848" }, { "db": "NVD", "id": "CVE-2021-22413" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22413" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380848" }, { "db": "VULMON", "id": "CVE-2021-22413" }, { "db": "NVD", "id": "CVE-2021-22413" }, { "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380848" }, { "db": "VULMON", "id": "CVE-2021-22413" }, { "db": "NVD", "id": "CVE-2021-22413" }, { "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380848" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22413" }, { "date": "2021-08-02T17:15:14.267000", "db": "NVD", "id": "CVE-2021-22413" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-03T00:00:00", "db": "VULHUB", "id": "VHN-380848" }, { "date": "2021-08-09T00:00:00", "db": "VULMON", "id": "CVE-2021-22413" }, { "date": "2022-05-03T16:04:40.443000", "db": "NVD", "id": "CVE-2021-22413" }, { "date": "2022-05-06T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-114" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-114" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI EMUI/Magic UI Input validation error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-114" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-114" } ], "trust": 0.6 } }
var-202112-0336
Vulnerability from variot
There is an Improper permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information. Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0336", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "NVD", "id": "CVE-2021-37056" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37056" } ] }, "cve": "CVE-2021-37056", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37056", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398889", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2021-37056", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37056", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202112-461", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398889", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398889" }, { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "NVD", "id": "CVE-2021-37056" }, { "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information. Huawei A vulnerability related to improper retention of permissions exists in smartphone products.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37056" }, { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "VULHUB", "id": "VHN-398889" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37056", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015766", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-461", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398889", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398889" }, { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "NVD", "id": "CVE-2021-37056" }, { "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "id": "VAR-202112-0336", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398889" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:11.113000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Fixes for permissions and access control issues vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173133" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-281", "trust": 1.1 }, { "problemtype": "Improper retention of permissions (CWE-281) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398889" }, { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "NVD", "id": "CVE-2021-37056" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.6, "url": "https://consumer.huawei.com/om/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37056" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398889" }, { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "NVD", "id": "CVE-2021-37056" }, { "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398889" }, { "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "db": "NVD", "id": "CVE-2021-37056" }, { "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398889" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "date": "2021-12-07T16:15:07.617000", "db": "NVD", "id": "CVE-2021-37056" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398889" }, { "date": "2022-11-30T02:06:00", "db": "JVNDB", "id": "JVNDB-2021-015766" }, { "date": "2021-12-09T17:55:11.090000", "db": "NVD", "id": "CVE-2021-37056" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-461" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-461" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to improper retention of permissions in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015766" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "permissions and access control issues", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-461" } ], "trust": 0.6 } }
var-202108-2219
Vulnerability from variot
There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause an infinite loop in DoS
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2219", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "NVD", "id": "CVE-2021-22381" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22381" } ] }, "cve": "CVE-2021-22381", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22381", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380816", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22381", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22381", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-101", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380816", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22381", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380816" }, { "db": "VULMON", "id": "CVE-2021-22381" }, { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "NVD", "id": "CVE-2021-22381" }, { "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause an infinite loop in DoS", "sources": [ { "db": "NVD", "id": "CVE-2021-22381" }, { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "VULHUB", "id": "VHN-380816" }, { "db": "VULMON", "id": "CVE-2021-22381" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22381", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010877", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-101", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380816", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22381", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380816" }, { "db": "VULMON", "id": "CVE-2021-22381" }, { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "NVD", "id": "CVE-2021-22381" }, { "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "id": "VAR-202108-2219", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380816" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:42:29.620000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22381", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159075" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380816" }, { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "NVD", "id": "CVE-2021-22381" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22381" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380816" }, { "db": "VULMON", "id": "CVE-2021-22381" }, { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "NVD", "id": "CVE-2021-22381" }, { "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380816" }, { "db": "VULMON", "id": "CVE-2021-22381" }, { "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "db": "NVD", "id": "CVE-2021-22381" }, { "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380816" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22381" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "date": "2021-08-02T17:15:13.670000", "db": "NVD", "id": "CVE-2021-22381" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380816" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22381" }, { "date": "2022-07-11T05:42:00", "db": "JVNDB", "id": "JVNDB-2021-010877" }, { "date": "2021-12-09T17:55:10.847000", "db": "NVD", "id": "CVE-2021-22381" }, { "date": "2021-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-101" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-101" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability related to input confirmation on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010877" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-101" } ], "trust": 0.6 } }
var-202206-0869
Vulnerability from variot
Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is a security vulnerability in HUAWEI EMUI. Attackers can exploit this vulnerability to obtain system secrets. 1. Magic UI 4.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0869", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "NVD", "id": "CVE-2022-31761" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31761" } ] }, "cve": "CVE-2022-31761", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31761", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-423594", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31761", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31761", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-1173", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423594", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423594" }, { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "NVD", "id": "CVE-2022-31761" }, { "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI and Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. There is a security vulnerability in HUAWEI EMUI. Attackers can exploit this vulnerability to obtain system secrets. 1. Magic UI 4.0.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31761" }, { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "VULHUB", "id": "VHN-423594" }, { "db": "VULMON", "id": "CVE-2022-31761" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31761", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011278", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-1173", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-47647", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423594", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31761", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423594" }, { "db": "VULMON", "id": "CVE-2022-31761" }, { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "NVD", "id": "CVE-2022-31761" }, { "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "id": "VAR-202206-0869", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423594" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:41.148000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196787" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "NVD", "id": "CVE-2022-31761" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31761" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31761/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423594" }, { "db": "VULMON", "id": "CVE-2022-31761" }, { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "NVD", "id": "CVE-2022-31761" }, { "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423594" }, { "db": "VULMON", "id": "CVE-2022-31761" }, { "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "db": "NVD", "id": "CVE-2022-31761" }, { "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423594" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31761" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "date": "2022-06-13T16:15:08.820000", "db": "NVD", "id": "CVE-2022-31761" }, { "date": "2022-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423594" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31761" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011278" }, { "date": "2022-06-18T03:13:57.547000", "db": "NVD", "id": "CVE-2022-31761" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1173" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1173" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011278" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1173" } ], "trust": 0.6 } }
var-202106-1927
Vulnerability from variot
There is an Improper Control of Generation of Code vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause denial of security services on a rooted device. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1927", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "NVD", "id": "CVE-2021-22336" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22336" } ] }, "cve": "CVE-2021-22336", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22336", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380771", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22336", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22336", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-238", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380771", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380771" }, { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "NVD", "id": "CVE-2021-22336" }, { "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Control of Generation of Code vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause denial of security services on a rooted device. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0", "sources": [ { "db": "NVD", "id": "CVE-2021-22336" }, { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "VULHUB", "id": "VHN-380771" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22336", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-007569", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-238", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380771", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380771" }, { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "NVD", "id": "CVE-2021-22336" }, { "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "id": "VAR-202106-1927", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380771" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:33.864000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0April\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "title": "Fix measures for code injection vulnerabilities in some Huawei mobile phones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153899" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-94", "trust": 1.1 }, { "problemtype": "Code injection (CWE-94) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380771" }, { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "NVD", "id": "CVE-2021-22336" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/4/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22336" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380771" }, { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "NVD", "id": "CVE-2021-22336" }, { "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380771" }, { "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "db": "NVD", "id": "CVE-2021-22336" }, { "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380771" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "date": "2021-06-03T17:15:07.923000", "db": "NVD", "id": "CVE-2021-22336" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380771" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007569" }, { "date": "2021-12-09T17:57:49.913000", "db": "NVD", "id": "CVE-2021-22336" }, { "date": "2021-06-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-238" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-238" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Code injection vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007569" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-238" } ], "trust": 0.6 } }
var-202106-0616
Vulnerability from variot
There is an Information Disclosure Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds read. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0616", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22354" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22354" } ] }, "cve": "CVE-2021-22354", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380789", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22354", "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22354", "trust": 1.0, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202106-2001", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380789", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22354", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380789" }, { "db": "VULMON", "id": "CVE-2021-22354" }, { "db": "NVD", "id": "CVE-2021-22354" }, { "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Information Disclosure Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause out-of-bounds read. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22354" }, { "db": "VULHUB", "id": "VHN-380789" }, { "db": "VULMON", "id": "CVE-2021-22354" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22354", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2001", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380789", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22354", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380789" }, { "db": "VULMON", "id": "CVE-2021-22354" }, { "db": "NVD", "id": "CVE-2021-22354" }, { "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "id": "VAR-202106-0616", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380789" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:52.444000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=155931" }, { "title": "CVE-2021-22354", "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22354 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-22354" }, { "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "CWE-843", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380789" }, { "db": "NVD", "id": "CVE-2021-22354" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22354" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/843.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2021-22354" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380789" }, { "db": "VULMON", "id": "CVE-2021-22354" }, { "db": "NVD", "id": "CVE-2021-22354" }, { "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380789" }, { "db": "VULMON", "id": "CVE-2021-22354" }, { "db": "NVD", "id": "CVE-2021-22354" }, { "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380789" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22354" }, { "date": "2021-06-30T18:15:08.473000", "db": "NVD", "id": "CVE-2021-22354" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-02T00:00:00", "db": "VULHUB", "id": "VHN-380789" }, { "date": "2021-07-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22354" }, { "date": "2021-07-02T14:58:50.503000", "db": "NVD", "id": "CVE-2021-22354" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2001" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2001" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2001" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2001" } ], "trust": 0.6 } }
var-202110-1499
Vulnerability from variot
There is a Verification errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1499", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "NVD", "id": "CVE-2021-22481" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22481" } ] }, "cve": "CVE-2021-22481", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22481", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380916", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22481", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22481", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2071", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380916", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22481", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380916" }, { "db": "VULMON", "id": "CVE-2021-22481" }, { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "NVD", "id": "CVE-2021-22481" }, { "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Verification errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality. Huawei Smartphones have unspecified vulnerabilities.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-22481" }, { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "VULHUB", "id": "VHN-380916" }, { "db": "VULMON", "id": "CVE-2021-22481" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22481", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014318", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2071", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380916", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22481", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380916" }, { "db": "VULMON", "id": "CVE-2021-22481" }, { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "NVD", "id": "CVE-2021-22481" }, { "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "id": "VAR-202110-1499", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380916" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:55.889000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22481", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Wearables Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171565" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "NVD", "id": "CVE-2021-22481" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22481" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380916" }, { "db": "VULMON", "id": "CVE-2021-22481" }, { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "NVD", "id": "CVE-2021-22481" }, { "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380916" }, { "db": "VULMON", "id": "CVE-2021-22481" }, { "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "db": "NVD", "id": "CVE-2021-22481" }, { "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380916" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22481" }, { "date": "2022-10-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "date": "2021-10-28T13:15:09.927000", "db": "NVD", "id": "CVE-2021-22481" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380916" }, { "date": "2021-11-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22481" }, { "date": "2022-10-12T08:47:00", "db": "JVNDB", "id": "JVNDB-2021-014318" }, { "date": "2021-11-02T00:13:23.913000", "db": "NVD", "id": "CVE-2021-22481" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2071" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2071" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014318" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2071" } ], "trust": 0.6 } }
var-202201-1016
Vulnerability from variot
There is an Integer overflow vulnerability with ACPU in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI and Magic UI Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Huawei Smartphone is a smartphone from the Chinese company Huawei
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1016", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.6, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "NVD", "id": "CVE-2021-39993" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-39993" } ] }, "cve": "CVE-2021-39993", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-39993", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2022-08047", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401394", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-39993", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-39993", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNVD", "id": "CNVD-2022-08047", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-568", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401394", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "VULHUB", "id": "VHN-401394" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "NVD", "id": "CVE-2021-39993" }, { "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Integer overflow vulnerability with ACPU in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access. EMUI and Magic UI Exists in an integer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Huawei Smartphone is a smartphone from the Chinese company Huawei", "sources": [ { "db": "NVD", "id": "CVE-2021-39993" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "VULHUB", "id": "VHN-401394" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-39993", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-003115", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-08047", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-568", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401394", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "VULHUB", "id": "VHN-401394" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "NVD", "id": "CVE-2021-39993" }, { "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "id": "VAR-202201-1016", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "VULHUB", "id": "VHN-401394" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" } ] }, "last_update_date": "2023-12-18T13:12:14.678000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0December\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" }, { "title": "Patch for Huawei Smartphone Buffer Overflow Vulnerability (CNVD-2022-08047)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/316841" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178044" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401394" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "NVD", "id": "CVE-2021-39993" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-39993" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/12/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "VULHUB", "id": "VHN-401394" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "NVD", "id": "CVE-2021-39993" }, { "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-08047" }, { "db": "VULHUB", "id": "VHN-401394" }, { "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "db": "NVD", "id": "CVE-2021-39993" }, { "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-30T00:00:00", "db": "CNVD", "id": "CNVD-2022-08047" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401394" }, { "date": "2023-02-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "date": "2022-01-10T14:10:20.773000", "db": "NVD", "id": "CVE-2021-39993" }, { "date": "2022-01-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-01T00:00:00", "db": "CNVD", "id": "CNVD-2022-08047" }, { "date": "2022-01-14T00:00:00", "db": "VULHUB", "id": "VHN-401394" }, { "date": "2023-02-08T07:00:00", "db": "JVNDB", "id": "JVNDB-2022-003115" }, { "date": "2022-01-14T16:44:08.930000", "db": "NVD", "id": "CVE-2021-39993" }, { "date": "2022-02-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-568" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-568" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Integer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-003115" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-568" } ], "trust": 0.6 } }
var-202203-0881
Vulnerability from variot
There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0881", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40047" } ] }, "cve": "CVE-2021-40047", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40047", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401448", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40047", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40047", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-1002", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401448", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "VULHUB", "id": "VHN-401448" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40047", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018717", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-1002", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401448", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "id": "VAR-202203-0881", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401448" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:31.039000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185903" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40047" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40047/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401448" }, { "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "db": "NVD", "id": "CVE-2021-40047" }, { "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401448" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "date": "2022-03-10T17:43:16.463000", "db": "NVD", "id": "CVE-2021-40047" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401448" }, { "date": "2023-07-05T08:12:00", "db": "JVNDB", "id": "JVNDB-2021-018717" }, { "date": "2022-03-14T15:35:04.920000", "db": "NVD", "id": "CVE-2021-40047" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-1002" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1002" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018717" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1002" } ], "trust": 0.6 } }
var-202112-0137
Vulnerability from variot
There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0137", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "NVD", "id": "CVE-2021-37041" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37041" } ] }, "cve": "CVE-2021-37041", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37041", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398874", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37041", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37041", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202112-464", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398874", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398874" }, { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "NVD", "id": "CVE-2021-37041" }, { "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read. Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37041" }, { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "VULHUB", "id": "VHN-398874" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37041", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015795", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202112-464", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398874", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398874" }, { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "NVD", "id": "CVE-2021-37041" }, { "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "id": "VAR-202112-0137", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398874" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:56.756000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0September\u00a02021 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "title": "Huawei Smartphone Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173136" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398874" }, { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "NVD", "id": "CVE-2021-37041" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.6, "url": "https://consumer.huawei.com/om/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37041" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398874" }, { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "NVD", "id": "CVE-2021-37041" }, { "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398874" }, { "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "db": "NVD", "id": "CVE-2021-37041" }, { "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398874" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "date": "2021-12-07T16:15:07.417000", "db": "NVD", "id": "CVE-2021-37041" }, { "date": "2021-12-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398874" }, { "date": "2022-11-30T05:08:00", "db": "JVNDB", "id": "JVNDB-2021-015795" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37041" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202112-464" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-464" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015795" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202112-464" } ], "trust": 0.6 } }
var-202110-1475
Vulnerability from variot
There is a Memory out-of-bounds access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed. Huawei Smartphones contain a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1475", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "NVD", "id": "CVE-2021-37002" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37002" } ] }, "cve": "CVE-2021-37002", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37002", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398833", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37002", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37002", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2097", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398833", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-37002", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398833" }, { "db": "VULMON", "id": "CVE-2021-37002" }, { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "NVD", "id": "CVE-2021-37002" }, { "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory out-of-bounds access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed. Huawei Smartphones contain a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37002" }, { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "VULHUB", "id": "VHN-398833" }, { "db": "VULMON", "id": "CVE-2021-37002" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37002", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014257", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2097", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398833", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37002", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398833" }, { "db": "VULMON", "id": "CVE-2021-37002" }, { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "NVD", "id": "CVE-2021-37002" }, { "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "id": "VAR-202110-1475", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398833" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:07.304000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-37002", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171628" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.1 }, { "problemtype": "Buffer error (CWE-119) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398833" }, { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "NVD", "id": "CVE-2021-37002" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37002" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202108-0000001180965965" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398833" }, { "db": "VULMON", "id": "CVE-2021-37002" }, { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "NVD", "id": "CVE-2021-37002" }, { "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398833" }, { "db": "VULMON", "id": "CVE-2021-37002" }, { "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "db": "NVD", "id": "CVE-2021-37002" }, { "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398833" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-37002" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "date": "2021-10-28T13:15:11.460000", "db": "NVD", "id": "CVE-2021-37002" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398833" }, { "date": "2021-11-01T00:00:00", "db": "VULMON", "id": "CVE-2021-37002" }, { "date": "2022-10-11T08:29:00", "db": "JVNDB", "id": "JVNDB-2021-014257" }, { "date": "2021-11-01T20:51:15.617000", "db": "NVD", "id": "CVE-2021-37002" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2097" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2097" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Buffer Error Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014257" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2097" } ], "trust": 0.6 } }
var-202203-0268
Vulnerability from variot
There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI contains a type confusion vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0268", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40061" } ] }, "cve": "CVE-2021-40061", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40061", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401462", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40061", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40061", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-974", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401462", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI contains a type confusion vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "VULHUB", "id": "VHN-401462" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40061", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018703", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-974", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401462", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "id": "VAR-202203-0268", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401462" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:04:02.636000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186006" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-843", "trust": 1.1 }, { "problemtype": "Mistake of type (CWE-843) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40061" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40061/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401462" }, { "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "db": "NVD", "id": "CVE-2021-40061" }, { "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401462" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "date": "2022-03-10T17:43:23.707000", "db": "NVD", "id": "CVE-2021-40061" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401462" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018703" }, { "date": "2022-03-14T16:18:51.173000", "db": "NVD", "id": "CVE-2021-40061" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-974" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-974" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product type mix-up vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018703" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-974" } ], "trust": 0.6 } }
var-202110-1477
Vulnerability from variot
There is a Buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by sending malicious images and inducing users to open the images may cause remote code execution. Huawei Smartphones have a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Successful exploitation could lead to remote code execution
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1477", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "NVD", "id": "CVE-2021-36999" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36999" } ] }, "cve": "CVE-2021-36999", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": true, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.8, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-36999", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-397932", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-36999", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36999", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202110-2099", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-397932", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-397932" }, { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "NVD", "id": "CVE-2021-36999" }, { "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by sending malicious images and inducing users to open the images may cause remote code execution. Huawei Smartphones have a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei). Successful exploitation could lead to remote code execution", "sources": [ { "db": "NVD", "id": "CVE-2021-36999" }, { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "VULHUB", "id": "VHN-397932" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36999", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014259", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2099", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-397932", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-397932" }, { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "NVD", "id": "CVE-2021-36999" }, { "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "id": "VAR-202110-1477", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-397932" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:40.614000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36999", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171635" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-397932" }, { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "NVD", "id": "CVE-2021-36999" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36999" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" } ], "sources": [ { "db": "VULHUB", "id": "VHN-397932" }, { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "NVD", "id": "CVE-2021-36999" }, { "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-397932" }, { "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "db": "NVD", "id": "CVE-2021-36999" }, { "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-397932" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "date": "2021-10-28T13:15:10.953000", "db": "NVD", "id": "CVE-2021-36999" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-397932" }, { "date": "2022-10-11T08:35:00", "db": "JVNDB", "id": "JVNDB-2021-014259" }, { "date": "2021-11-01T20:50:20.327000", "db": "NVD", "id": "CVE-2021-36999" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2099" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2099" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 smartphone \u00a0 classic buffer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014259" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2099" } ], "trust": 0.6 } }
var-202111-1585
Vulnerability from variot
There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are remote DoS vulnerabilities in Huawei Emui and Magic UI
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1585", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "NVD", "id": "CVE-2021-37031" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37031" } ] }, "cve": "CVE-2021-37031", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37031", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-398864", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-37031", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37031", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-1896", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398864", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398864" }, { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "NVD", "id": "CVE-2021-37031" }, { "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly. Huawei Smartphones have unspecified vulnerabilities.Service operation interruption (DoS) It may be in a state. Huawei Emui is a mobile operating system developed based on Android. Magic Ui is a mobile operating system developed based on Android. There are remote DoS vulnerabilities in Huawei Emui and Magic UI", "sources": [ { "db": "NVD", "id": "CVE-2021-37031" }, { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "VULHUB", "id": "VHN-398864" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37031", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015557", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-1896", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2021-102861", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-398864", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398864" }, { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "NVD", "id": "CVE-2021-37031" }, { "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "id": "VAR-202111-1585", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398864" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:21.661000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0August\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "title": "Huawei Emui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=172193" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "NVD", "id": "CVE-2021-37031" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37031" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398864" }, { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "NVD", "id": "CVE-2021-37031" }, { "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398864" }, { "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "db": "NVD", "id": "CVE-2021-37031" }, { "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-23T00:00:00", "db": "VULHUB", "id": "VHN-398864" }, { "date": "2022-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "date": "2021-11-23T16:15:09.750000", "db": "NVD", "id": "CVE-2021-37031" }, { "date": "2021-11-23T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398864" }, { "date": "2022-11-24T06:40:00", "db": "JVNDB", "id": "JVNDB-2021-015557" }, { "date": "2021-12-09T17:57:49.613000", "db": "NVD", "id": "CVE-2021-37031" }, { "date": "2021-12-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-1896" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1896" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015557" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-1896" } ], "trust": 0.6 } }
var-202203-0261
Vulnerability from variot
There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is tampered with and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0261", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40053" } ] }, "cve": "CVE-2021-40053", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40053", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401454", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40053", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40053", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202203-983", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401454", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a permission control vulnerability in the Nearby module.Successful exploitation of this vulnerability will affect availability and integrity. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is tampered with and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "VULHUB", "id": "VHN-401454" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40053", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018711", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-983", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401454", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "id": "VAR-202203-0261", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401454" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:56.714000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei EMUI and Huawei Magic UI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=208071" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40053" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40053/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401454" }, { "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "db": "NVD", "id": "CVE-2021-40053" }, { "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401454" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "date": "2022-03-10T17:43:19.430000", "db": "NVD", "id": "CVE-2021-40053" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-27T00:00:00", "db": "VULHUB", "id": "VHN-401454" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018711" }, { "date": "2022-10-27T18:47:20.967000", "db": "NVD", "id": "CVE-2021-40053" }, { "date": "2022-09-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-983" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-983" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018711" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-983" } ], "trust": 0.6 } }
var-202203-0968
Vulnerability from variot
There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0968", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40049" } ] }, "cve": "CVE-2021-40049", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40049", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401450", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40049", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40049", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-991", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401450", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "VULHUB", "id": "VHN-401450" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40049", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018715", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-991", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401450", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "id": "VAR-202203-0968", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401450" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:01.935000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI and Honor Magic Ui Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186015" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40049" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40049/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401450" }, { "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "db": "NVD", "id": "CVE-2021-40049" }, { "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401450" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "date": "2022-03-10T17:43:17.500000", "db": "NVD", "id": "CVE-2021-40049" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401450" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018715" }, { "date": "2022-03-14T15:36:29.610000", "db": "NVD", "id": "CVE-2021-40049" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-991" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-991" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018715" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-991" } ], "trust": 0.6 } }
var-202106-0612
Vulnerability from variot
There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the device to crash and restart. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0612", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22350" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22350" } ] }, "cve": "CVE-2021-22350", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380785", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22350", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22350", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-2008", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380785", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22350", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380785" }, { "db": "VULMON", "id": "CVE-2021-22350" }, { "db": "NVD", "id": "CVE-2021-22350" }, { "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may cause the device to crash and restart. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. The following products and versions are affected: EMUI 11.0.0, EMUI 10.1.1, Magic UI 4.0.0, Magic UI 3.1.1", "sources": [ { "db": "NVD", "id": "CVE-2021-22350" }, { "db": "VULHUB", "id": "VHN-380785" }, { "db": "VULMON", "id": "CVE-2021-22350" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22350", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-2008", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380785", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22350", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380785" }, { "db": "VULMON", "id": "CVE-2021-22350" }, { "db": "NVD", "id": "CVE-2021-22350" }, { "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "id": "VAR-202106-0612", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380785" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:22:51.178000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for Huawei smartphone buffer error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156086" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380785" }, { "db": "NVD", "id": "CVE-2021-22350" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22350" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/119.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380785" }, { "db": "VULMON", "id": "CVE-2021-22350" }, { "db": "NVD", "id": "CVE-2021-22350" }, { "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380785" }, { "db": "VULMON", "id": "CVE-2021-22350" }, { "db": "NVD", "id": "CVE-2021-22350" }, { "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380785" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22350" }, { "date": "2021-06-30T21:15:09.830000", "db": "NVD", "id": "CVE-2021-22350" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-28T00:00:00", "db": "VULHUB", "id": "VHN-380785" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22350" }, { "date": "2022-06-28T14:11:45.273000", "db": "NVD", "id": "CVE-2021-22350" }, { "date": "2021-08-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-2008" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2008" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone buffer error vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2008" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-2008" } ], "trust": 0.6 } }
var-202202-1526
Vulnerability from variot
There is an improper permission management vulnerability in the Wallet apps. Successful exploitation of this vulnerability may affect service confidentiality. EMUI and Magic UI There is a vulnerability in improper default permissions.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202202-1526", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "NVD", "id": "CVE-2021-37103" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37103" } ] }, "cve": "CVE-2021-37103", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37103", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-398940", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37103", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37103", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202202-2068", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-398940", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398940" }, { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "NVD", "id": "CVE-2021-37103" }, { "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper permission management vulnerability in the Wallet apps. Successful exploitation of this vulnerability may affect service confidentiality. EMUI and Magic UI There is a vulnerability in improper default permissions.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37103" }, { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "VULHUB", "id": "VHN-398940" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37103", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-007118", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202202-2068", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398940", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398940" }, { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "NVD", "id": "CVE-2021-37103" }, { "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "id": "VAR-202202-1526", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398940" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:02.919000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0October\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=184225" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398940" }, { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "NVD", "id": "CVE-2021-37103" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37103" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-37103/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398940" }, { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "NVD", "id": "CVE-2021-37103" }, { "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398940" }, { "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "db": "NVD", "id": "CVE-2021-37103" }, { "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-398940" }, { "date": "2023-07-12T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "date": "2022-02-25T19:15:11.870000", "db": "NVD", "id": "CVE-2021-37103" }, { "date": "2022-02-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-08T00:00:00", "db": "VULHUB", "id": "VHN-398940" }, { "date": "2023-07-12T06:34:00", "db": "JVNDB", "id": "JVNDB-2022-007118" }, { "date": "2022-03-08T13:59:22.953000", "db": "NVD", "id": "CVE-2021-37103" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202202-2068" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2068" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability regarding improper default permissions in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-007118" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202202-2068" } ], "trust": 0.6 } }
var-202203-0973
Vulnerability from variot
There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0973", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40055" } ] }, "cve": "CVE-2021-40055", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 6.9, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40055", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 7.1, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-401456", "impactScore": 6.9, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:C/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40055", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40055", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202203-979", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401456", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "VULHUB", "id": "VHN-401456" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40055", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018709", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-979", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401456", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "id": "VAR-202203-0973", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401456" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:55.882000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185893" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40055" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40055/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401456" }, { "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "db": "NVD", "id": "CVE-2021-40055" }, { "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401456" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "date": "2022-03-10T17:43:20.810000", "db": "NVD", "id": "CVE-2021-40055" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401456" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018709" }, { "date": "2022-03-14T15:53:08.183000", "db": "NVD", "id": "CVE-2021-40055" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-979" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-979" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018709" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-979" } ], "trust": 0.6 } }
var-202106-0595
Vulnerability from variot
There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0595", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22371" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22371" } ] }, "cve": "CVE-2021-22371", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380806", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2021-22371", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22371", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-1992", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380806", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22371", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380806" }, { "db": "VULMON", "id": "CVE-2021-22371" }, { "db": "NVD", "id": "CVE-2021-22371" }, { "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Permission Management Vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company. Huawei smartphones have security flaws", "sources": [ { "db": "NVD", "id": "CVE-2021-22371" }, { "db": "VULHUB", "id": "VHN-380806" }, { "db": "VULMON", "id": "CVE-2021-22371" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22371", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202106-1992", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380806", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22371", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380806" }, { "db": "VULMON", "id": "CVE-2021-22371" }, { "db": "NVD", "id": "CVE-2021-22371" }, { "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "id": "VAR-202106-0595", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380806" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:52.465000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Repair measures for security vulnerabilities in Huawei smartphones", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=156075" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380806" }, { "db": "NVD", "id": "CVE-2021-22371" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/5/" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22371" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/276.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380806" }, { "db": "VULMON", "id": "CVE-2021-22371" }, { "db": "NVD", "id": "CVE-2021-22371" }, { "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380806" }, { "db": "VULMON", "id": "CVE-2021-22371" }, { "db": "NVD", "id": "CVE-2021-22371" }, { "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-30T00:00:00", "db": "VULHUB", "id": "VHN-380806" }, { "date": "2021-06-30T00:00:00", "db": "VULMON", "id": "CVE-2021-22371" }, { "date": "2021-06-30T15:15:10.413000", "db": "NVD", "id": "CVE-2021-22371" }, { "date": "2021-06-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-07-06T00:00:00", "db": "VULHUB", "id": "VHN-380806" }, { "date": "2021-07-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22371" }, { "date": "2021-07-06T16:19:21.713000", "db": "NVD", "id": "CVE-2021-22371" }, { "date": "2021-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-1992" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1992" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei smartphone security breach", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1992" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-1992" } ], "trust": 0.6 } }
var-202108-2205
Vulnerability from variot
There is a Permission Control Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. Huawei Smartphones contain vulnerabilities related to fraudulent authentication.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2205", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "NVD", "id": "CVE-2021-22389" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22389" } ] }, "cve": "CVE-2021-22389", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22389", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380824", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22389", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22389", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202108-106", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380824", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-22389", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380824" }, { "db": "VULMON", "id": "CVE-2021-22389" }, { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "NVD", "id": "CVE-2021-22389" }, { "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Permission Control Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed. Huawei Smartphones contain vulnerabilities related to fraudulent authentication.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22389" }, { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "VULHUB", "id": "VHN-380824" }, { "db": "VULMON", "id": "CVE-2021-22389" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22389", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010875", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-106", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380824", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22389", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380824" }, { "db": "VULMON", "id": "CVE-2021-22389" }, { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "NVD", "id": "CVE-2021-22389" }, { "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "id": "VAR-202108-2205", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380824" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:37:18.781000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22389", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159051" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-863", "trust": 1.1 }, { "problemtype": "Illegal authentication (CWE-863) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380824" }, { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "NVD", "id": "CVE-2021-22389" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22389" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/863.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380824" }, { "db": "VULMON", "id": "CVE-2021-22389" }, { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "NVD", "id": "CVE-2021-22389" }, { "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380824" }, { "db": "VULMON", "id": "CVE-2021-22389" }, { "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "db": "NVD", "id": "CVE-2021-22389" }, { "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380824" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22389" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "date": "2021-08-02T17:15:13.883000", "db": "NVD", "id": "CVE-2021-22389" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380824" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22389" }, { "date": "2022-07-11T05:34:00", "db": "JVNDB", "id": "JVNDB-2021-010875" }, { "date": "2021-12-09T17:55:10.153000", "db": "NVD", "id": "CVE-2021-22389" }, { "date": "2021-08-09T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-106" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-106" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Fraud related to unauthorized authentication on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010875" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-106" } ], "trust": 0.6 } }
var-202208-0811
Vulnerability from variot
The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0811", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37003" } ] }, "cve": "CVE-2022-37003", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-37003", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37003", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202208-2397", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files. Huawei of EMUI , HarmonyOS , Magic UI There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37003", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014553", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2397", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427496", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37003", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "id": "VAR-202208-0811", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427496" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:48:34.474000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204367" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-276", "trust": 1.1 }, { "problemtype": "Inappropriate default permissions (CWE-276) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37003" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37003/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427496" }, { "db": "VULMON", "id": "CVE-2022-37003" }, { "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "db": "NVD", "id": "CVE-2022-37003" }, { "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427496" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37003" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "date": "2022-08-10T20:16:04.073000", "db": "NVD", "id": "CVE-2022-37003" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427496" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37003" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014553" }, { "date": "2022-08-15T18:02:06.477000", "db": "NVD", "id": "CVE-2022-37003" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2397" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2397" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Inappropriate Default Permission Vulnerability in Products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014553" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2397" } ], "trust": 0.6 } }
var-202206-0025
Vulnerability from variot
The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in a format string vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0025", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31753" } ] }, "cve": "CVE-2022-31753", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31753", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423586", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31753", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31753", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-469", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423586", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31753", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in a format string vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31753", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-012035", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-469", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66173", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423586", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31753", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "id": "VAR-202206-0025", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423586" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:55:59.362000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Fixes for formatting string error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=197630" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-134", "trust": 1.0 }, { "problemtype": "Format string problem (CWE-134) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31753" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31753/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/134.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423586" }, { "db": "VULMON", "id": "CVE-2022-31753" }, { "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "db": "NVD", "id": "CVE-2022-31753" }, { "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423586" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31753" }, { "date": "2023-08-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "date": "2022-06-13T16:15:08.620000", "db": "NVD", "id": "CVE-2022-31753" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-27T00:00:00", "db": "VULHUB", "id": "VHN-423586" }, { "date": "2022-06-27T00:00:00", "db": "VULMON", "id": "CVE-2022-31753" }, { "date": "2023-08-25T08:12:00", "db": "JVNDB", "id": "JVNDB-2022-012035" }, { "date": "2022-06-27T16:13:45.880000", "db": "NVD", "id": "CVE-2022-31753" }, { "date": "2022-07-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-469" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-469" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product Format String Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-012035" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "format string error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-469" } ], "trust": 0.6 } }
var-202208-0666
Vulnerability from variot
The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202208-0666", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-37002" } ] }, "cve": "CVE-2022-37002", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-37002", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-37002", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202208-2399", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-37002", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-014554", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202208-2399", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-427494", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-37002", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "id": "VAR-202208-0666", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427494" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:25:58.071000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=204369" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-863", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-37002" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-37002/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427494" }, { "db": "VULMON", "id": "CVE-2022-37002" }, { "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "db": "NVD", "id": "CVE-2022-37002" }, { "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-10T00:00:00", "db": "VULHUB", "id": "VHN-427494" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37002" }, { "date": "2023-09-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "date": "2022-08-10T20:16:03.777000", "db": "NVD", "id": "CVE-2022-37002" }, { "date": "2022-08-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-15T00:00:00", "db": "VULHUB", "id": "VHN-427494" }, { "date": "2022-08-10T00:00:00", "db": "VULMON", "id": "CVE-2022-37002" }, { "date": "2023-09-20T08:29:00", "db": "JVNDB", "id": "JVNDB-2022-014554" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2022-37002" }, { "date": "2022-08-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202208-2399" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2399" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-014554" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202208-2399" } ], "trust": 0.6 } }
var-202206-0377
Vulnerability from variot
The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI , HarmonyOS , Magic UI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0377", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31762" } ] }, "cve": "CVE-2022-31762", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31762", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-423595", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31762", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31762", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-473", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423595", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-31762", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation. Huawei of EMUI , HarmonyOS , Magic UI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31762", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011277", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-473", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66177", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423595", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31762", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "id": "VAR-202206-0377", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423595" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:00:47.147000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196700" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31762 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.1 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31762" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31762/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/20.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-31762" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423595" }, { "db": "VULMON", "id": "CVE-2022-31762" }, { "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "db": "NVD", "id": "CVE-2022-31762" }, { "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423595" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31762" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "date": "2022-06-13T15:15:10.423000", "db": "NVD", "id": "CVE-2022-31762" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-10-05T00:00:00", "db": "VULHUB", "id": "VHN-423595" }, { "date": "2022-10-05T00:00:00", "db": "VULMON", "id": "CVE-2022-31762" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011277" }, { "date": "2022-10-05T14:59:08.577000", "db": "NVD", "id": "CVE-2022-31762" }, { "date": "2022-07-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-473" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-473" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product input verification vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011277" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-473" } ], "trust": 0.6 } }
var-202201-1021
Vulnerability from variot
There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HarmonyOS Wearables is an electronic watch operating system from Huawei, a Chinese company. An attacker can use this vulnerability to cause system exceptions. There is a security vulnerability in Huawei HarmonyOS Wearables
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1021", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos wearables", "scope": "eq", "trust": 0.6, "vendor": "huawei", "version": "2.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40009" } ] }, "cve": "CVE-2021-40009", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40009", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-08049", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401410", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40009", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40009", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2022-08049", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202201-314", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-401410", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. plural Huawei Smartphone products contain an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HarmonyOS Wearables is an electronic watch operating system from Huawei, a Chinese company. An attacker can use this vulnerability to cause system exceptions. There is a security vulnerability in Huawei HarmonyOS Wearables", "sources": [ { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" } ], "trust": 2.25 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40009", "trust": 3.9 }, { "db": "JVNDB", "id": "JVNDB-2022-002891", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-08049", "trust": 0.7 }, { "db": "CNNVD", "id": "CNNVD-202201-314", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401410", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "id": "VAR-202201-1021", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" } ], "trust": 0.06999999999999999 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" } ] }, "last_update_date": "2023-12-18T14:04:05.148000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Patch for Huawei HarmonyOS Wearables Out-of-bounds Write Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/316801" }, { "title": "Huawei HarmonyOS Wearables Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178011" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40009" }, { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202201-0000001239056313" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-08049" }, { "db": "VULHUB", "id": "VHN-401410" }, { "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "db": "NVD", "id": "CVE-2021-40009" }, { "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-30T00:00:00", "db": "CNVD", "id": "CNVD-2022-08049" }, { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401410" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "date": "2022-01-10T14:10:21.310000", "db": "NVD", "id": "CVE-2021-40009" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-01T00:00:00", "db": "CNVD", "id": "CNVD-2022-08049" }, { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401410" }, { "date": "2023-01-24T05:28:00", "db": "JVNDB", "id": "JVNDB-2022-002891" }, { "date": "2022-01-13T15:32:45.070000", "db": "NVD", "id": "CVE-2021-40009" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-314" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-314" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002891" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-314" } ], "trust": 0.6 } }
var-202112-0335
Vulnerability from variot
There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0335", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37020" } ] }, "cve": "CVE-2021-37020", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37020", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398853", "impactScore": 4.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37020", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37020", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202109-2060", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-398853", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Stack-based Buffer Overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to Out-of-bounds read. plural Huawei A vulnerability related to input validation exists in smartphone products.Information is obtained and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "VULHUB", "id": "VHN-398853" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37020", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015760", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2060", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398853", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "id": "VAR-202112-0335", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398853" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:26:33.104000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202109-0000001196270727", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Enter the fix for the verification error vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173236" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.0 }, { "problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-20", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37020" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398853" }, { "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "db": "NVD", "id": "CVE-2021-37020" }, { "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-07T00:00:00", "db": "VULHUB", "id": "VHN-398853" }, { "date": "2022-11-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "date": "2021-12-07T17:15:08.303000", "db": "NVD", "id": "CVE-2021-37020" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398853" }, { "date": "2022-11-30T01:43:00", "db": "JVNDB", "id": "JVNDB-2021-015760" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-37020" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2060" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2060" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Input validation vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015760" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2060" } ], "trust": 0.6 } }
var-202206-0259
Vulnerability from variot
The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0259", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-46814" } ] }, "cve": "CVE-2021-46814", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46814", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-423547", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-46814", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-46814", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202206-481", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-423547", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-46814", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI contains an out-of-bounds read vulnerability and an out-of-bounds write vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-46814", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011372", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-481", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-51604", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423547", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-46814", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "id": "VAR-202206-0259", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423547" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:51:04.965000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "CWE-125", "trust": 1.0 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": " Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46814" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-46814/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/787.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423547" }, { "db": "VULMON", "id": "CVE-2021-46814" }, { "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "db": "NVD", "id": "CVE-2021-46814" }, { "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423547" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2021-46814" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "date": "2022-06-13T15:15:09.893000", "db": "NVD", "id": "CVE-2021-46814" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423547" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2021-46814" }, { "date": "2023-08-21T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-011372" }, { "date": "2023-08-08T14:21:49.707000", "db": "NVD", "id": "CVE-2021-46814" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-481" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-481" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011372" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-481" } ], "trust": 0.6 } }
var-202110-1482
Vulnerability from variot
There is a issue that trustlist strings being repeatedly inserted into the linked list in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause exceptions when managing the system trustlist. Huawei Smartphones contain a race condition vulnerability.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1482", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "NVD", "id": "CVE-2021-36994" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-36994" } ] }, "cve": "CVE-2021-36994", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 4.3, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36994", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "exploitabilityScore": 8.6, "id": "VHN-398827", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "exploitabilityScore": 2.2, "impactScore": 1.4, "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 3.7, "baseSeverity": "Low", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-36994", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-36994", "trust": 1.8, "value": "LOW" }, { "author": "CNNVD", "id": "CNNVD-202110-2093", "trust": 0.6, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-398827", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398827" }, { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "NVD", "id": "CVE-2021-36994" }, { "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a issue that trustlist strings being repeatedly inserted into the linked list in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause exceptions when managing the system trustlist. Huawei Smartphones contain a race condition vulnerability.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-36994" }, { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "VULHUB", "id": "VHN-398827" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-36994", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-014264", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2093", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398827", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398827" }, { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "NVD", "id": "CVE-2021-36994" }, { "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "id": "VAR-202110-1482", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398827" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:12:18.822000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-36994", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei Smartphone Repair measures for the competition condition problem loophole", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=168230" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-362", "trust": 1.1 }, { "problemtype": "Race condition (CWE-362) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398827" }, { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "NVD", "id": "CVE-2021-36994" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-36994" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398827" }, { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "NVD", "id": "CVE-2021-36994" }, { "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398827" }, { "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "db": "NVD", "id": "CVE-2021-36994" }, { "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-398827" }, { "date": "2022-10-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "date": "2021-10-28T13:15:10.740000", "db": "NVD", "id": "CVE-2021-36994" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-01T00:00:00", "db": "VULHUB", "id": "VHN-398827" }, { "date": "2022-10-11T08:52:00", "db": "JVNDB", "id": "JVNDB-2021-014264" }, { "date": "2021-11-01T23:07:39.173000", "db": "NVD", "id": "CVE-2021-36994" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2093" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2093" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Race Condition Vulnerability in Smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014264" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "competition condition problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2093" } ], "trust": 0.6 } }
var-202201-1022
Vulnerability from variot
There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI Exists in an out-of-bounds write vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1022", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40026" } ] }, "cve": "CVE-2021-40026", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40026", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401427", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40026", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40026", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-312", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401427", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS , EMUI , Magic UI Exists in an out-of-bounds write vulnerability.Information may be tampered with. Huawei HarmonyOS Wearables is an electronic watch from Huawei, the Chinese company Huawei. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations", "sources": [ { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "VULHUB", "id": "VHN-401427" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40026", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002899", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-312", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401427", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "id": "VAR-202201-1022", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401427" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:53.181000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Wearables Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178009" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40026" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202201-0000001239056313" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401427" }, { "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "db": "NVD", "id": "CVE-2021-40026" }, { "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401427" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "date": "2022-01-10T14:10:21.760000", "db": "NVD", "id": "CVE-2021-40026" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401427" }, { "date": "2023-01-25T08:35:00", "db": "JVNDB", "id": "JVNDB-2022-002899" }, { "date": "2022-01-13T14:26:51.273000", "db": "NVD", "id": "CVE-2021-40026" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-312" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-312" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002899" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-312" } ], "trust": 0.6 } }
var-202207-0182
Vulnerability from variot
The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0182", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34739" } ] }, "cve": "CVE-2022-34739", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-34739", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-427091", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-34739", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34739", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-393", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427091", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34739", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34739", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013201", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-393", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52824", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427091", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34739", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "id": "VAR-202207-0182", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427091" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:17.295000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=199744" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34739" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34739/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427091" }, { "db": "VULMON", "id": "CVE-2022-34739" }, { "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "db": "NVD", "id": "CVE-2022-34739" }, { "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427091" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34739" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "date": "2022-07-12T14:15:19.417000", "db": "NVD", "id": "CVE-2022-34739" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427091" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34739" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013201" }, { "date": "2022-07-19T12:47:45.723000", "db": "NVD", "id": "CVE-2022-34739" }, { "date": "2022-07-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-393" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-393" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013201" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-393" } ], "trust": 0.6 } }
var-202110-1416
Vulnerability from variot
There is a Logic Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability. Huawei Smartphones have unspecified vulnerabilities.Information is tampered with and service operation is interrupted (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202110-1416", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "NVD", "id": "CVE-2021-22436" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22436" } ] }, "cve": "CVE-2021-22436", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22436", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380871", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22436", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22436", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202110-2039", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-380871", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22436", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380871" }, { "db": "VULMON", "id": "CVE-2021-22436" }, { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "NVD", "id": "CVE-2021-22436" }, { "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Logic Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability. Huawei Smartphones have unspecified vulnerabilities.Information is tampered with and service operation is interrupted (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22436" }, { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "VULHUB", "id": "VHN-380871" }, { "db": "VULMON", "id": "CVE-2021-22436" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22436", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-014461", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202110-2039", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380871", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22436", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380871" }, { "db": "VULMON", "id": "CVE-2021-22436" }, { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "NVD", "id": "CVE-2021-22436" }, { "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "id": "VAR-202110-1416", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380871" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:07:00.573000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0July\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "title": "Huawei HarmonyOS Repair measures to handle logic errors", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171449" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "NVD", "id": "CVE-2021-22436" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22436" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-wearables-202108-0000001135186780" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380871" }, { "db": "VULMON", "id": "CVE-2021-22436" }, { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "NVD", "id": "CVE-2021-22436" }, { "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380871" }, { "db": "VULMON", "id": "CVE-2021-22436" }, { "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "db": "NVD", "id": "CVE-2021-22436" }, { "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-10-28T00:00:00", "db": "VULHUB", "id": "VHN-380871" }, { "date": "2021-10-28T00:00:00", "db": "VULMON", "id": "CVE-2021-22436" }, { "date": "2022-10-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "date": "2021-10-28T13:15:08.773000", "db": "NVD", "id": "CVE-2021-22436" }, { "date": "2021-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-11-02T00:00:00", "db": "VULHUB", "id": "VHN-380871" }, { "date": "2021-11-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22436" }, { "date": "2022-10-19T03:59:00", "db": "JVNDB", "id": "JVNDB-2021-014461" }, { "date": "2021-11-02T14:31:18.487000", "db": "NVD", "id": "CVE-2021-22436" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202110-2039" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2039" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerabilities in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-014461" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "handling logic errors", "sources": [ { "db": "CNNVD", "id": "CNNVD-202110-2039" } ], "trust": 0.6 } }
var-202101-1002
Vulnerability from variot
There is a heap base buffer overflow vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability can cause heap overflow and memory overwriting when the system incorrectly processes the update file. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Information is tampered with and denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company. Various Huawei and Honor mobile device operating systems have buffer error vulnerabilities. The following products and models are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202101-1002", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "NVD", "id": "CVE-2020-9142" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-9142" } ] }, "cve": "CVE-2020-9142", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 6.4, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9142", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-187267", "impactScore": 4.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 5.2, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.1, "baseSeverity": "Critical", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2020-9142", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-9142", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202101-1098", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-187267", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-187267" }, { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "NVD", "id": "CVE-2020-9142" }, { "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a heap base buffer overflow vulnerability in some Huawei smartphone.Successful exploitation of this vulnerability can cause heap overflow and memory overwriting when the system incorrectly processes the update file. plural Huawei Smartphones contain a vulnerability related to out-of-bounds writing.Information is tampered with and denial of service (DoS) It may be put into a state. Huawei Emui is an Android-based mobile operating system developed by Huawei in China. Honor Magic Ui is an Android-based mobile operating system developed by China Honor Company. Various Huawei and Honor mobile device operating systems have buffer error vulnerabilities. The following products and models are affected: EMUI 11.0.0, EMUI 10.1.1, EMUI 10.1.0, EMUI 10.0.0, EMUI 9.1.1, EMUI 9.1.0, Magic UI 4.0.0, Magic UI 3.1.1, Magic UI 3.1.0, Magic UI 3.0.0, Magic UI 2.1.1", "sources": [ { "db": "NVD", "id": "CVE-2020-9142" }, { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "VULHUB", "id": "VHN-187267" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-9142", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2020-015408", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202101-1098", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-187267", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187267" }, { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "NVD", "id": "CVE-2020-9142" }, { "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "id": "VAR-202101-1002", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-187267" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:44.416000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0Dec-20", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "title": "Huawei Emui and Honor Magic Ui Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=139458" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-187267" }, { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "NVD", "id": "CVE-2020-9142" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2020/12/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-9142" } ], "sources": [ { "db": "VULHUB", "id": "VHN-187267" }, { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "NVD", "id": "CVE-2020-9142" }, { "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-187267" }, { "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "db": "NVD", "id": "CVE-2020-9142" }, { "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-13T00:00:00", "db": "VULHUB", "id": "VHN-187267" }, { "date": "2021-09-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "date": "2021-01-13T22:15:14.130000", "db": "NVD", "id": "CVE-2020-9142" }, { "date": "2021-01-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-19T00:00:00", "db": "VULHUB", "id": "VHN-187267" }, { "date": "2021-09-21T09:03:00", "db": "JVNDB", "id": "JVNDB-2020-015408" }, { "date": "2021-01-19T14:45:28.930000", "db": "NVD", "id": "CVE-2020-9142" }, { "date": "2021-01-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202101-1098" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1098" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability regarding out-of-bounds writing on smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-015408" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202101-1098" } ], "trust": 0.6 } }
var-202201-1055
Vulnerability from variot
The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution. Huawei EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1055", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40010" } ] }, "cve": "CVE-2021-40010", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40010", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401411", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40010", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40010", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202201-276", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401411", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The bone voice ID TA has a heap overflow vulnerability.Successful exploitation of this vulnerability may result in malicious code execution. Huawei EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "VULHUB", "id": "VHN-401411" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40010", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002887", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-276", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401411", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "id": "VAR-202201-1055", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401411" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:27:25.024000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202201-0000001194056366 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" }, { "title": "Huawei HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177995" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-787", "trust": 1.1 }, { "problemtype": "Out-of-bounds writing (CWE-787) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202201-0000001194056366" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40010" }, { "trust": 0.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401411" }, { "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "db": "NVD", "id": "CVE-2021-40010" }, { "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401411" }, { "date": "2023-01-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "date": "2022-01-10T14:10:21.360000", "db": "NVD", "id": "CVE-2021-40010" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-30T00:00:00", "db": "VULHUB", "id": "VHN-401411" }, { "date": "2023-01-24T03:05:00", "db": "JVNDB", "id": "JVNDB-2022-002887" }, { "date": "2022-09-30T13:21:19.767000", "db": "NVD", "id": "CVE-2021-40010" }, { "date": "2022-05-16T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-276" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-276" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Out-of-bounds write vulnerabilities in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002887" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-276" } ], "trust": 0.6 } }
var-202111-1767
Vulnerability from variot
There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202111-1767", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": "eq", "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37133" } ] }, "cve": "CVE-2021-37133", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37133", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398969", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37133", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37133", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202111-2133", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398969", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality. HarmonyOS Exists in a vulnerability related to the leakage of resources to the wrong area.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37133", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-017589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202111-2133", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398969", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-37133", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "id": "VAR-202111-1767", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398969" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:42:11.599000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202111-0000001217889667 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=176794" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Leakage of resources to the wrong area (CWE-668) [NVD evaluation ]", "trust": 0.8 }, { "problemtype": "CWE-668", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37133" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202111-0000001217889667" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398969" }, { "db": "VULMON", "id": "CVE-2021-37133" }, { "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "db": "NVD", "id": "CVE-2021-37133" }, { "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-03T00:00:00", "db": "VULHUB", "id": "VHN-398969" }, { "date": "2022-01-03T00:00:00", "db": "VULMON", "id": "CVE-2021-37133" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "date": "2022-01-03T22:15:09.800000", "db": "NVD", "id": "CVE-2021-37133" }, { "date": "2021-11-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-398969" }, { "date": "2022-01-04T00:00:00", "db": "VULMON", "id": "CVE-2021-37133" }, { "date": "2023-01-27T05:09:00", "db": "JVNDB", "id": "JVNDB-2021-017589" }, { "date": "2023-08-08T14:22:24.967000", "db": "NVD", "id": "CVE-2021-37133" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202111-2133" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2133" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HarmonyOS\u00a0 Vulnerability in leaking resources to the wrong area in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-017589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202111-2133" } ], "trust": 0.6 } }
var-202209-0391
Vulnerability from variot
The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202209-0391", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-39005" } ] }, "cve": "CVE-2022-39005", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-39005", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-39005", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202209-194", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks. Huawei of EMUI , HarmonyOS , Magic UI Contains a vulnerability regarding the lack of free memory after expiration.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-39005", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-017589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202209-194", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-428499", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-39005", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "id": "VAR-202209-0391", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-428499" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:44.885000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=208090" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-401", "trust": 1.1 }, { "problemtype": "Lack of memory release after expiration (CWE-401) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-39005" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202209-0000001392078921" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-39005/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-428499" }, { "db": "VULMON", "id": "CVE-2022-39005" }, { "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "db": "NVD", "id": "CVE-2022-39005" }, { "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-16T00:00:00", "db": "VULHUB", "id": "VHN-428499" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39005" }, { "date": "2023-10-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "date": "2022-09-16T18:15:18.090000", "db": "NVD", "id": "CVE-2022-39005" }, { "date": "2022-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-21T00:00:00", "db": "VULHUB", "id": "VHN-428499" }, { "date": "2022-09-16T00:00:00", "db": "VULMON", "id": "CVE-2022-39005" }, { "date": "2023-10-13T08:43:00", "db": "JVNDB", "id": "JVNDB-2022-017589" }, { "date": "2022-09-21T12:47:59.630000", "db": "NVD", "id": "CVE-2022-39005" }, { "date": "2022-09-22T00:00:00", "db": "CNNVD", "id": "CNNVD-202209-194" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-194" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of freeing memory after expiration in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-017589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202209-194" } ], "trust": 0.6 } }
var-202108-2216
Vulnerability from variot
There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause verification bypass and directions to abnormal addresses. Huawei Smartphones contain vulnerabilities related to buffer size calculation errors.Information may be tampered with
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2216", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "NVD", "id": "CVE-2021-22392" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22392" } ] }, "cve": "CVE-2021-22392", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22392", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380827", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22392", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22392", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-110", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380827", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22392", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380827" }, { "db": "VULMON", "id": "CVE-2021-22392" }, { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "NVD", "id": "CVE-2021-22392" }, { "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause verification bypass and directions to abnormal addresses. Huawei Smartphones contain vulnerabilities related to buffer size calculation errors.Information may be tampered with", "sources": [ { "db": "NVD", "id": "CVE-2021-22392" }, { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "VULHUB", "id": "VHN-380827" }, { "db": "VULMON", "id": "CVE-2021-22392" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22392", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-010871", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-110", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380827", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22392", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380827" }, { "db": "VULMON", "id": "CVE-2021-22392" }, { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "NVD", "id": "CVE-2021-22392" }, { "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "id": "VAR-202108-2216", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380827" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:01:10.263000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22392", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159052" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 }, { "problemtype": "Buffer size calculation error (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380827" }, { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "NVD", "id": "CVE-2021-22392" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22392" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/131.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380827" }, { "db": "VULMON", "id": "CVE-2021-22392" }, { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "NVD", "id": "CVE-2021-22392" }, { "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380827" }, { "db": "VULMON", "id": "CVE-2021-22392" }, { "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "db": "NVD", "id": "CVE-2021-22392" }, { "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380827" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22392" }, { "date": "2022-07-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "date": "2021-08-02T17:15:14.033000", "db": "NVD", "id": "CVE-2021-22392" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380827" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22392" }, { "date": "2022-07-11T05:34:00", "db": "JVNDB", "id": "JVNDB-2021-010871" }, { "date": "2021-12-09T17:55:11.027000", "db": "NVD", "id": "CVE-2021-22392" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-110" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-110" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability regarding buffer size calculation error in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-010871" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-110" } ], "trust": 0.6 } }
var-202204-0964
Vulnerability from variot
The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-0964", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40065" } ] }, "cve": "CVE-2021-40065", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-40065", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-401466", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40065", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40065", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2027", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401466", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-40065", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality. Huawei of EMUI , HarmonyOS , Magic UI Exists in unspecified vulnerabilities.Information may be obtained. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40065", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-019278", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2027", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-53579", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401466", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40065", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "id": "VAR-202204-0964", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401466" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:55:06.468000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=189574" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40065" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40065/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401466" }, { "db": "VULMON", "id": "CVE-2021-40065" }, { "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "db": "NVD", "id": "CVE-2021-40065" }, { "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-11T00:00:00", "db": "VULHUB", "id": "VHN-401466" }, { "date": "2022-04-11T00:00:00", "db": "VULMON", "id": "CVE-2021-40065" }, { "date": "2023-07-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "date": "2022-04-11T20:15:15.987000", "db": "NVD", "id": "CVE-2021-40065" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-15T00:00:00", "db": "VULHUB", "id": "VHN-401466" }, { "date": "2022-04-15T00:00:00", "db": "VULMON", "id": "CVE-2021-40065" }, { "date": "2023-07-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2021-019278" }, { "date": "2022-04-15T19:35:37.037000", "db": "NVD", "id": "CVE-2021-40065" }, { "date": "2022-04-18T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2027" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2027" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-019278" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2027" } ], "trust": 0.6 } }
var-202206-0262
Vulnerability from variot
AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an uninitialized pointer access vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0262", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31759" } ] }, "cve": "CVE-2022-31759", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 2.1, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31759", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "VHN-423592", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-31759", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31759", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-474", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423592", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an uninitialized pointer access vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31759", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011279", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-474", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-66178", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423592", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31759", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "id": "VAR-202206-0262", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423592" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:36:53.936000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196701" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-824", "trust": 1.1 }, { "problemtype": "Accessing uninitialized pointers (CWE-824) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31759" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202206-0000001270510450" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31759/" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423592" }, { "db": "VULMON", "id": "CVE-2022-31759" }, { "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "db": "NVD", "id": "CVE-2022-31759" }, { "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423592" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31759" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "date": "2022-06-13T15:15:10.337000", "db": "NVD", "id": "CVE-2022-31759" }, { "date": "2022-06-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423592" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31759" }, { "date": "2023-08-21T08:18:00", "db": "JVNDB", "id": "JVNDB-2022-011279" }, { "date": "2022-06-18T03:09:08.127000", "db": "NVD", "id": "CVE-2022-31759" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-474" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-474" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product Uninitialized Pointer Access Vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011279" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-474" } ], "trust": 0.6 } }
var-202108-2197
Vulnerability from variot
A component of the Huawei smartphone has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevation of Privileges. plural Huawei Smartphone products contain vulnerabilities related to double release.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2197", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "NVD", "id": "CVE-2021-22386" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22386" } ] }, "cve": "CVE-2021-22386", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Medium", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.9, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-22386", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-380821", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.0, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.0, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22386", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22386", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-979", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380821", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22386", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380821" }, { "db": "VULMON", "id": "CVE-2021-22386" }, { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "NVD", "id": "CVE-2021-22386" }, { "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A component of the Huawei smartphone has a Double Free vulnerability. Local attackers may exploit this vulnerability to cause Root Elevation of Privileges. plural Huawei Smartphone products contain vulnerabilities related to double release.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22386" }, { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "VULHUB", "id": "VHN-380821" }, { "db": "VULMON", "id": "CVE-2021-22386" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22386", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-009784", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202108-979", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380821", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22386", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380821" }, { "db": "VULMON", "id": "CVE-2021-22386" }, { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "NVD", "id": "CVE-2021-22386" }, { "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "id": "VAR-202108-2197", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380821" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:48.816000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2021-22386", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "title": "Huawei smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159371" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-415", "trust": 1.1 }, { "problemtype": "Double release (CWE-415) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380821" }, { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "NVD", "id": "CVE-2021-22386" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/cn/docs/security/update/oem_security_update_phone_202106-0000001165452077" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22386" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/415.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380821" }, { "db": "VULMON", "id": "CVE-2021-22386" }, { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "NVD", "id": "CVE-2021-22386" }, { "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380821" }, { "db": "VULMON", "id": "CVE-2021-22386" }, { "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "db": "NVD", "id": "CVE-2021-22386" }, { "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-10T00:00:00", "db": "VULHUB", "id": "VHN-380821" }, { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22386" }, { "date": "2022-05-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "date": "2021-08-10T14:15:07.213000", "db": "NVD", "id": "CVE-2021-22386" }, { "date": "2021-08-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380821" }, { "date": "2021-08-17T00:00:00", "db": "VULMON", "id": "CVE-2021-22386" }, { "date": "2022-05-23T08:41:00", "db": "JVNDB", "id": "JVNDB-2021-009784" }, { "date": "2021-12-09T17:55:10.250000", "db": "NVD", "id": "CVE-2021-22386" }, { "date": "2022-03-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-979" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-979" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Double release vulnerability in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-009784" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-979" } ], "trust": 0.6 } }
var-202204-1426
Vulnerability from variot
The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Huawei HarmonyOS DFX module has a reuse-after-free vulnerability. This vulnerability stems from the confusion of the instructions responsible for releasing memory in the DFX module
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202204-1426", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22252" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-22252" } ] }, "cve": "CVE-2022-22252", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-409781", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2022-22252", "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "HIGH", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-22252", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202204-2031", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-409781", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2022-22252", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The DFX module has a UAF vulnerability.Successful exploitation of this vulnerability may affect system stability. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Huawei HarmonyOS DFX module has a reuse-after-free vulnerability. This vulnerability stems from the confusion of the instructions responsible for releasing memory in the DFX module", "sources": [ { "db": "NVD", "id": "CVE-2022-22252" }, { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22252", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202204-2031", "trust": 0.6 }, { "db": "CNVD", "id": "CNVD-2022-44624", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-409781", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-22252", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "id": "VAR-202204-1426", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-409781" } ], "trust": 0.01 }, "last_update_date": "2024-02-13T01:54:54.489000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=194227" }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305 " }, { "title": "CVE-2022-XXXX", "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-rce " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "trust": 1.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202204-0000001266901897" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22252/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/416.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/alphabugx/cve-2022-23305" } ], "sources": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-409781" }, { "db": "VULMON", "id": "CVE-2022-22252" }, { "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "db": "NVD", "id": "CVE-2022-22252" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-13T00:00:00", "db": "VULHUB", "id": "VHN-409781" }, { "date": "2022-05-13T00:00:00", "db": "VULMON", "id": "CVE-2022-22252" }, { "date": "2022-04-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "date": "2022-05-13T16:15:08.233000", "db": "NVD", "id": "CVE-2022-22252" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-05-26T00:00:00", "db": "VULHUB", "id": "VHN-409781" }, { "date": "2022-05-26T00:00:00", "db": "VULMON", "id": "CVE-2022-22252" }, { "date": "2022-05-30T00:00:00", "db": "CNNVD", "id": "CNNVD-202204-2031" }, { "date": "2022-05-26T15:19:28.540000", "db": "NVD", "id": "CVE-2022-22252" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2031" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HUAWEI HarmonyOS Resource Management Error Vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2031" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202204-2031" } ], "trust": 0.6 } }
var-202106-1920
Vulnerability from variot
There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-1920", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "NVD", "id": "CVE-2021-22317" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22317" } ] }, "cve": "CVE-2021-22317", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-22317", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-380752", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-22317", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22317", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202106-233", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380752", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22317", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380752" }, { "db": "VULMON", "id": "CVE-2021-22317" }, { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "NVD", "id": "CVE-2021-22317" }, { "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Information Disclosure vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may impair data confidentiality. Huawei There are unspecified vulnerabilities in smartphones.Information may be obtained. A Huawei phone is a Huawei smartphone from the Chinese Huawei (Huawei) company", "sources": [ { "db": "NVD", "id": "CVE-2021-22317" }, { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "VULHUB", "id": "VHN-380752" }, { "db": "VULMON", "id": "CVE-2021-22317" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22317", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-007565", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202106-233", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380752", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22317", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380752" }, { "db": "VULMON", "id": "CVE-2021-22317" }, { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "NVD", "id": "CVE-2021-22317" }, { "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "id": "VAR-202106-1920", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380752" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:51.607000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0February\u00a02021", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "title": "Repair measures for Huawei\u0027s smartphone information leakage vulnerability", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=153895" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "NVD", "id": "CVE-2021-22317" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/2/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22317" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380752" }, { "db": "VULMON", "id": "CVE-2021-22317" }, { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "NVD", "id": "CVE-2021-22317" }, { "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380752" }, { "db": "VULMON", "id": "CVE-2021-22317" }, { "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "db": "NVD", "id": "CVE-2021-22317" }, { "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-03T00:00:00", "db": "VULHUB", "id": "VHN-380752" }, { "date": "2021-06-03T00:00:00", "db": "VULMON", "id": "CVE-2021-22317" }, { "date": "2022-02-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "date": "2021-06-03T16:15:11.380000", "db": "NVD", "id": "CVE-2021-22317" }, { "date": "2021-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380752" }, { "date": "2021-06-10T00:00:00", "db": "VULMON", "id": "CVE-2021-22317" }, { "date": "2022-02-17T05:10:00", "db": "JVNDB", "id": "JVNDB-2021-007565" }, { "date": "2021-12-09T17:57:49.430000", "db": "NVD", "id": "CVE-2021-22317" }, { "date": "2021-06-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-233" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-233" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 Vulnerability in smartphones", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-007565" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-233" } ], "trust": 0.6 } }
var-202201-1024
Vulnerability from variot
There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Huawei HarmonyOS Camera component has a buffer error vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1024", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "NVD", "id": "CVE-2021-40031" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40031" } ] }, "cve": "CVE-2021-40031", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40031", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401432", "impactScore": 2.9, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40031", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40031", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-297", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401432", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401432" }, { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "NVD", "id": "CVE-2021-40031" }, { "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system. The Huawei HarmonyOS Camera component has a buffer error vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2021-40031" }, { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "VULHUB", "id": "VHN-401432" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40031", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002896", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-297", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-401432", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401432" }, { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "NVD", "id": "CVE-2021-40031" }, { "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "id": "VAR-202201-1024", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401432" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:46:48.100000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI\u00a0EMUI/Magic\u00a0UI\u00a0security\u00a0updates\u00a0January\u00a02022", "trust": 0.8, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "title": "Huawei HarmonyOS Fixes for code issue vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=178003" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-476", "trust": 1.1 }, { "problemtype": "NULL Pointer dereference (CWE-476) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401432" }, { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "NVD", "id": "CVE-2021-40031" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40031" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401432" }, { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "NVD", "id": "CVE-2021-40031" }, { "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401432" }, { "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "db": "NVD", "id": "CVE-2021-40031" }, { "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401432" }, { "date": "2023-01-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "date": "2022-01-10T14:10:21.987000", "db": "NVD", "id": "CVE-2021-40031" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401432" }, { "date": "2023-01-25T07:51:00", "db": "JVNDB", "id": "JVNDB-2022-002896" }, { "date": "2022-01-13T14:37:17.600000", "db": "NVD", "id": "CVE-2021-40031" }, { "date": "2022-01-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-297" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-297" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 In \u00a0NULL\u00a0 Pointer dereference vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002896" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "code problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-297" } ], "trust": 0.6 } }
var-202108-2213
Vulnerability from variot
There is an Improper Validation of Integrity Check Value Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202108-2213", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "9.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22442" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:2.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:9.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22442" } ] }, "cve": "CVE-2021-22442", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380877", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULMON", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2021-22442", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "MEDIUM", "trust": 0.1, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22442", "trust": 1.0, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202108-123", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380877", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2021-22442", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380877" }, { "db": "VULMON", "id": "CVE-2021-22442" }, { "db": "NVD", "id": "CVE-2021-22442" }, { "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an Improper Validation of Integrity Check Value Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset. Huawei Smartphone is a smartphone of the Chinese company Huawei (Huawei)", "sources": [ { "db": "NVD", "id": "CVE-2021-22442" }, { "db": "VULHUB", "id": "VHN-380877" }, { "db": "VULMON", "id": "CVE-2021-22442" } ], "trust": 1.08 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22442", "trust": 1.8 }, { "db": "CNNVD", "id": "CNNVD-202108-123", "trust": 0.7 }, { "db": "VULHUB", "id": "VHN-380877", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-22442", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380877" }, { "db": "VULMON", "id": "CVE-2021-22442" }, { "db": "NVD", "id": "CVE-2021-22442" }, { "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "id": "VAR-202108-2213", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380877" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:00:02.973000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Huawei Smartphone Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=159055" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-354", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380877" }, { "db": "NVD", "id": "CVE-2021-22442" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.8, "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202107-0000001170634565" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22442" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/354.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380877" }, { "db": "VULMON", "id": "CVE-2021-22442" }, { "db": "NVD", "id": "CVE-2021-22442" }, { "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380877" }, { "db": "VULMON", "id": "CVE-2021-22442" }, { "db": "NVD", "id": "CVE-2021-22442" }, { "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-08-02T00:00:00", "db": "VULHUB", "id": "VHN-380877" }, { "date": "2021-08-02T00:00:00", "db": "VULMON", "id": "CVE-2021-22442" }, { "date": "2021-08-02T17:15:14.567000", "db": "NVD", "id": "CVE-2021-22442" }, { "date": "2021-08-02T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-380877" }, { "date": "2021-08-06T00:00:00", "db": "VULMON", "id": "CVE-2021-22442" }, { "date": "2021-12-09T17:55:11.030000", "db": "NVD", "id": "CVE-2021-22442" }, { "date": "2021-11-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202108-123" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-123" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei HarmonyOS Security hole", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-123" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202108-123" } ], "trust": 0.6 } }
var-202112-0350
Vulnerability from variot
There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202112-0350", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-37050" } ] }, "cve": "CVE-2021-37050", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2021-37050", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-398883", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-37050", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-37050", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2020", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-398883", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality", "sources": [ { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "VULHUB", "id": "VHN-398883" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-37050", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-015858", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2020", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-398883", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "id": "VAR-202112-0350", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-398883" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:16:07.968000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Missing\u00a0sensitive\u00a0data\u00a0encryption\u00a0vulnerability\u00a0in\u00a0some\u00a0HUAWEI\u00a0phones", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "title": "Huawei HarmonyOS Fixes for encryption problem vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=173788" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-311", "trust": 1.1 }, { "problemtype": "Lack of encryption of critical data (CWE-311) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-37050" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" } ], "sources": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-398883" }, { "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "db": "NVD", "id": "CVE-2021-37050" }, { "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-08T00:00:00", "db": "VULHUB", "id": "VHN-398883" }, { "date": "2022-12-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "date": "2021-12-08T15:15:09.480000", "db": "NVD", "id": "CVE-2021-37050" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-12-09T00:00:00", "db": "VULHUB", "id": "VHN-398883" }, { "date": "2022-12-01T03:15:00", "db": "JVNDB", "id": "JVNDB-2021-015858" }, { "date": "2021-12-09T17:58:47.893000", "db": "NVD", "id": "CVE-2021-37050" }, { "date": "2021-12-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2020" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2020" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Vulnerability related to lack of encryption of important data in smartphone products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-015858" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2020" } ], "trust": 0.6 } }
var-202203-0260
Vulnerability from variot
There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability. Huawei of HarmonyOS , EMUI , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0260", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40052" } ] }, "cve": "CVE-2021-40052", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 7.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40052", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401453", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40052", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40052", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202203-984", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401453", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2021-40052", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability. Huawei of HarmonyOS , EMUI , Magic UI contains a buffer size miscalculation vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40052", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2021-018712", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-984", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401453", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2021-40052", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "id": "VAR-202203-0260", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401453" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:32:16.265000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=203865" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2021-40052 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-131", "trust": 1.1 }, { "problemtype": "Miscalculation of buffer size (CWE-131) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40052" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202208-0000001310476756" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40052/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/131.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2021-40052" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401453" }, { "db": "VULMON", "id": "CVE-2021-40052" }, { "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "db": "NVD", "id": "CVE-2021-40052" }, { "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401453" }, { "date": "2022-03-10T00:00:00", "db": "VULMON", "id": "CVE-2021-40052" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "date": "2022-03-10T17:43:18.923000", "db": "NVD", "id": "CVE-2021-40052" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-19T00:00:00", "db": "VULHUB", "id": "VHN-401453" }, { "date": "2023-01-19T00:00:00", "db": "VULMON", "id": "CVE-2021-40052" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018712" }, { "date": "2023-01-19T03:30:20.603000", "db": "NVD", "id": "CVE-2021-40052" }, { "date": "2022-08-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-984" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-984" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Buffer size miscalculation vulnerability in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018712" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-984" } ], "trust": 0.6 } }
var-202201-1040
Vulnerability from variot
There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202201-1040", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "harmonyos", "scope": "lt", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "2.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40035" } ] }, "cve": "CVE-2021-40035", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40035", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-401436", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-40035", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40035", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202201-280", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-401436", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability. Huawei HarmonyOS , EMUI , Magic UI Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state. Huawei HarmonyOS is an operating system of the Chinese company Huawei. Provide a microkernel-based full-scenario distributed operating system", "sources": [ { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "VULHUB", "id": "VHN-401436" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40035", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2022-002908", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202201-280", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-13181", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-401436", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "id": "VAR-202201-1040", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401436" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:55:35.992000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-202201-0000001238736331 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=177446" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.1 }, { "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40035" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202201-0000001238736331" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401436" }, { "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "db": "NVD", "id": "CVE-2021-40035" }, { "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-10T00:00:00", "db": "VULHUB", "id": "VHN-401436" }, { "date": "2023-01-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "date": "2022-01-10T14:10:22.360000", "db": "NVD", "id": "CVE-2021-40035" }, { "date": "2022-01-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-01-13T00:00:00", "db": "VULHUB", "id": "VHN-401436" }, { "date": "2023-01-27T02:20:00", "db": "JVNDB", "id": "JVNDB-2022-002908" }, { "date": "2022-01-13T15:32:16.207000", "db": "NVD", "id": "CVE-2021-40035" }, { "date": "2022-01-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202201-280" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-280" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Classic buffer overflow vulnerability in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-002908" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202201-280" } ], "trust": 0.6 } }
var-202207-0144
Vulnerability from variot
The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China's Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202207-0144", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-34743" } ] }, "cve": "CVE-2022-34743", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34743", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-427078", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-34743", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-34743", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202207-417", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-427078", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2022-34743", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Service operation interruption (DoS) It may be in a state. HUAWEI HarmonyOS is an operating system of China\u0027s Huawei (HUAWEI). Provide a microkernel-based full-scenario distributed operating system. There is a security vulnerability in HUAWEI HarmonyOS 2.0", "sources": [ { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-34743", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-013197", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202207-417", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-52823", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-427078", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-34743", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "id": "VAR-202207-0144", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-427078" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T14:03:52.335000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI HarmonyOS Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=200889" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "trust": 2.6, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-34743" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202207-0000001289909300" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-34743/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/125.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-427078" }, { "db": "VULMON", "id": "CVE-2022-34743" }, { "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "db": "NVD", "id": "CVE-2022-34743" }, { "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-12T00:00:00", "db": "VULHUB", "id": "VHN-427078" }, { "date": "2022-07-12T00:00:00", "db": "VULMON", "id": "CVE-2022-34743" }, { "date": "2023-09-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "date": "2022-07-12T14:15:19.570000", "db": "NVD", "id": "CVE-2022-34743" }, { "date": "2022-07-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-07-19T00:00:00", "db": "VULHUB", "id": "VHN-427078" }, { "date": "2022-07-19T00:00:00", "db": "VULMON", "id": "CVE-2022-34743" }, { "date": "2023-09-06T08:21:00", "db": "JVNDB", "id": "JVNDB-2022-013197" }, { "date": "2022-07-19T12:53:51.187000", "db": "NVD", "id": "CVE-2022-34743" }, { "date": "2022-07-29T00:00:00", "db": "CNNVD", "id": "CNNVD-202207-417" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-417" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-013197" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202207-417" } ], "trust": 0.6 } }
var-202206-0972
Vulnerability from variot
Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI and Magic UI Exists in a vulnerability related to the lack of authentication.Information may be obtained. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. The following products and versions are affected: EMUI 10.1.0, EMUI 10.1.1, EMUI 11.0.0, EMUI 12.0.0, EMUI 11.0.1, Magic UI 3.1.0, Magic UI 3.1.1, Magic UI 4.0.0
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202206-0972", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "NVD", "id": "CVE-2022-31752" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-31752" } ] }, "cve": "CVE-2022-31752", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 2.1, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2022-31752", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Low", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-423585", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-31752", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-31752", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202206-1176", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-423585", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2022-31752", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-423585" }, { "db": "VULMON", "id": "CVE-2022-31752" }, { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "NVD", "id": "CVE-2022-31752" }, { "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality. Huawei of EMUI and Magic UI Exists in a vulnerability related to the lack of authentication.Information may be obtained. HUAWEI EMUI is a mobile operating system developed by China Huawei (HUAWEI) based on Android. The following products and versions are affected: EMUI 10.1.0, EMUI 10.1.1, EMUI 11.0.0, EMUI 12.0.0, EMUI 11.0.1, Magic UI 3.1.0, Magic UI 3.1.1, Magic UI 4.0.0", "sources": [ { "db": "NVD", "id": "CVE-2022-31752" }, { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "VULHUB", "id": "VHN-423585" }, { "db": "VULMON", "id": "CVE-2022-31752" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-31752", "trust": 3.4 }, { "db": "JVNDB", "id": "JVNDB-2022-011283", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202206-1176", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2022-47646", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-423585", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2022-31752", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423585" }, { "db": "VULMON", "id": "CVE-2022-31752" }, { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "NVD", "id": "CVE-2022-31752" }, { "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "id": "VAR-202206-0972", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-423585" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:59:41.063000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=196789" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-862", "trust": 1.1 }, { "problemtype": "Lack of authentication (CWE-862) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-423585" }, { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "NVD", "id": "CVE-2022-31752" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.6, "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-31752" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-31752/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/862.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULHUB", "id": "VHN-423585" }, { "db": "VULMON", "id": "CVE-2022-31752" }, { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "NVD", "id": "CVE-2022-31752" }, { "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-423585" }, { "db": "VULMON", "id": "CVE-2022-31752" }, { "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "db": "NVD", "id": "CVE-2022-31752" }, { "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-13T00:00:00", "db": "VULHUB", "id": "VHN-423585" }, { "date": "2022-06-13T00:00:00", "db": "VULMON", "id": "CVE-2022-31752" }, { "date": "2023-08-21T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "date": "2022-06-13T16:15:08.570000", "db": "NVD", "id": "CVE-2022-31752" }, { "date": "2022-06-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-06-18T00:00:00", "db": "VULHUB", "id": "VHN-423585" }, { "date": "2022-06-18T00:00:00", "db": "VULMON", "id": "CVE-2022-31752" }, { "date": "2023-08-21T08:19:00", "db": "JVNDB", "id": "JVNDB-2022-011283" }, { "date": "2022-06-18T03:12:25.967000", "db": "NVD", "id": "CVE-2022-31752" }, { "date": "2022-06-20T00:00:00", "db": "CNNVD", "id": "CNNVD-202206-1176" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1176" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Huawei\u00a0 of \u00a0EMUI\u00a0 and \u00a0Magic\u00a0UI\u00a0 Vulnerability regarding lack of authentication in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-011283" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202206-1176" } ], "trust": 0.6 } }
var-202109-1959
Vulnerability from variot
There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows. EMUI , HarmonyOS , Magic UI Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202109-1959", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-22319" } ] }, "cve": "CVE-2021-22319", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22319", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-380754", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2021-22319", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-22319", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202109-2053", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-380754", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows. EMUI , HarmonyOS , Magic UI Exists in an integer overflow vulnerability.Service operation interruption (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "VULHUB", "id": "VHN-380754" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-22319", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018589", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202109-2053", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-380754", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "id": "VAR-202109-1959", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-380754" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:17:43.444000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "security-bulletins-phones-202109-0000001150310956 Huawei\u00a0Support\u00a0Bulletin", "trust": 0.8, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" }, { "title": "Huawei HarmonyOS Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=171906" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-190", "trust": 1.1 }, { "problemtype": "Integer overflow or wraparound (CWE-190) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "trust": 1.7, "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-22319" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202109-0000001196270727" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-22319/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-380754" }, { "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "db": "NVD", "id": "CVE-2021-22319" }, { "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-02-25T00:00:00", "db": "VULHUB", "id": "VHN-380754" }, { "date": "2023-06-30T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "date": "2022-02-25T19:15:08.823000", "db": "NVD", "id": "CVE-2021-22319" }, { "date": "2021-09-05T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-07T00:00:00", "db": "VULHUB", "id": "VHN-380754" }, { "date": "2023-06-30T08:37:00", "db": "JVNDB", "id": "JVNDB-2021-018589" }, { "date": "2022-03-07T17:35:13.593000", "db": "NVD", "id": "CVE-2021-22319" }, { "date": "2022-03-11T00:00:00", "db": "CNNVD", "id": "CNNVD-202109-2053" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2053" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Integer overflow vulnerability in product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018589" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202109-2053" } ], "trust": 0.6 } }
var-202203-0972
Vulnerability from variot
There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0972", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "4.0.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "12.0.0" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.1" }, { "model": "magic ui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "3.1.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.0" }, { "model": "harmonyos", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "2.0" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "10.1.1" }, { "model": "emui", "scope": "eq", "trust": 1.0, "vendor": "huawei", "version": "11.0.0" }, { "model": "magic ui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "harmonyos", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null }, { "model": "emui", "scope": null, "trust": 0.8, "vendor": "huawei", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2021-40050" } ] }, "cve": "CVE-2021-40050", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "impactScore": 10.0, "integrityImpact": "COMPLETE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 10.0, "confidentialityImpact": "Complete", "exploitabilityScore": null, "id": "CVE-2021-40050", "impactScore": null, "integrityImpact": "Complete", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 10.0, "id": "VHN-401451", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2021-40050", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2021-40050", "trust": 1.8, "value": "CRITICAL" }, { "author": "CNNVD", "id": "CNNVD-202203-986", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-401451", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow. Huawei of EMUI , HarmonyOS , Magic UI Exists in an out-of-bounds read vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "VULHUB", "id": "VHN-401451" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2021-40050", "trust": 3.3 }, { "db": "JVNDB", "id": "JVNDB-2021-018714", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202203-986", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-401451", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "id": "VAR-202203-0972", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-401451" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T11:56:26.711000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HUAWEI EMUI Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=186013" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-125", "trust": 1.1 }, { "problemtype": "Out-of-bounds read (CWE-125) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "trust": 2.5, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-40050" }, { "trust": 0.6, "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-202203-0000001212585336" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2021-40050/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-401451" }, { "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "db": "NVD", "id": "CVE-2021-40050" }, { "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-10T00:00:00", "db": "VULHUB", "id": "VHN-401451" }, { "date": "2023-07-05T00:00:00", "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "date": "2022-03-10T17:43:17.980000", "db": "NVD", "id": "CVE-2021-40050" }, { "date": "2022-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-03-14T00:00:00", "db": "VULHUB", "id": "VHN-401451" }, { "date": "2023-07-05T08:11:00", "db": "JVNDB", "id": "JVNDB-2021-018714" }, { "date": "2022-03-14T15:40:09.787000", "db": "NVD", "id": "CVE-2021-40050" }, { "date": "2022-03-21T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-986" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-986" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0Huawei\u00a0 Product out-of-bounds read vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2021-018714" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-986" } ], "trust": 0.6 } }
cve-2021-40035
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability due to a boundary error with the Samba server", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:36", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability due to a boundary error with the Samba server" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40035", "datePublished": "2022-01-07T22:39:36", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22482
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.047Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Uninitialized variable vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of invalid data." } ], "problemTypes": [ { "descriptions": [ { "description": "Uninitialized variable vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22482", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Uninitialized variable vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of invalid data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uninitialized variable vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22482", "datePublished": "2021-10-28T12:21:27", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.047Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40057
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.783Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap-based and stack-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based and stack-based buffer overflow vulnerabilities", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40057", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap-based and stack-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based and stack-based buffer overflow vulnerabilities" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40057", "datePublished": "2022-03-07T13:50:03", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37093
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Access Control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37093", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Improper Access Control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to attackers steal short messages." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Access Control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37093", "datePublished": "2021-12-08T14:13:11", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.796Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37114
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37114", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read vulnerability in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37114", "datePublished": "2022-01-03T21:07:28", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.804Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22395
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.252Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Code injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22395", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a code injection vulnerability in smartphones. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22395", "datePublished": "2022-02-25T18:11:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.252Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36998
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.642Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to read an array that is out of bounds." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36998", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to read an array that is out of bounds." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36998", "datePublished": "2021-10-28T12:27:26", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40050
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.299Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:49", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an out-of-bounds read vulnerability in the IFAA module. Successful exploitation of this vulnerability may cause stack overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40050", "datePublished": "2022-03-07T13:50:49", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.299Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22407
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:22:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22407", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22407", "datePublished": "2021-10-28T12:22:28", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36999
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.370Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by sending malicious images and inducing users to open the images may cause remote code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper\u807dRestriction\u807dof\u807dOperations\u807dwithin\u807dthe\u807dBounds\u807dof\u807da\u807dMemory\u807dBuffer", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36999", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by sending malicious images and inducing users to open the images may cause remote code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper\u807dRestriction\u807dof\u807dOperations\u807dwithin\u807dthe\u807dBounds\u807dof\u807da\u807dMemory\u807dBuffer" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36999", "datePublished": "2021-10-28T12:27:34", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22381
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.291Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause an infinite loop in DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:39:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22381", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause an infinite loop in DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22381", "datePublished": "2021-08-02T16:39:25", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.291Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22487
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.015Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22487", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read vulnerability in Huawei Smartphone. Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22487", "datePublished": "2021-10-28T12:25:11", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.015Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22481
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Verification errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22481", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Verification errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22481", "datePublished": "2021-10-28T12:21:20", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22414
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" }, { "status": "affected", "version": "8.2" }, { "status": "affected", "version": "8.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory Buffer Errors Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Buffer Errors", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:47:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22414", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" }, { "version_affected": "=", "version_value": "8.2" }, { "version_affected": "=", "version_value": "8.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory Buffer Errors Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Buffer Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22414", "datePublished": "2021-08-02T16:47:23", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37069
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37069", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37069", "datePublished": "2021-12-08T14:12:48", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40029
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability due to a boundary error with the Samba server", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40029", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Buffer overflow vulnerability due to a boundary error with the Samba server in the file management module in smartphones. Successful exploitation of this vulnerability may affect function stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability due to a boundary error with the Samba server" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40029", "datePublished": "2022-01-07T22:39:34", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39001
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.038Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "Path traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The number identification module has a path traversal vulnerability. Successful exploitation of this vulnerability may cause data disclosure." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Path traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39001", "datePublished": "2022-09-16T17:57:48", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.038Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36987
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.694Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a issue that nodes in the linked list being freed for multiple times in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Double Release", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36987", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a issue that nodes in the linked list being freed for multiple times in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause the system to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double Release" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36987", "datePublished": "2021-10-28T12:25:51", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46741
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:41.587Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:12:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The basic framework and setting module have defects, which were introduced during the design. Successful exploitation of this vulnerability may affect system integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46741", "datePublished": "2022-07-11T13:52:47", "dateReserved": "2022-03-26T00:00:00", "dateUpdated": "2024-08-04T05:17:41.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37047
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.767Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause some services to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Input verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause some services to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37047", "datePublished": "2021-12-07T15:45:26", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.767Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37074
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.702Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Race Condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37074", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Race Condition vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to the user root privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race Condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37074", "datePublished": "2021-12-08T14:12:53", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22406
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.130Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:22:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22406", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Uncaught Exception vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncaught Exception" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22406", "datePublished": "2021-10-28T12:22:22", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.130Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22447
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.191Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Check for Unusual or Exceptional Conditions Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T17:39:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22447", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Check for Unusual or Exceptional Conditions Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Check for Unusual or Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22447", "datePublished": "2021-08-02T17:39:56", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.191Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36995
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.560Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36995", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36995", "datePublished": "2021-10-28T12:27:06", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.560Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22428
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Incomplete Cleanup Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete Cleanup", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:54:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22428", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Incomplete Cleanup Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete Cleanup" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22428", "datePublished": "2021-08-02T16:54:27", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22489
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.654Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22489", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22489", "datePublished": "2022-02-25T18:11:03", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36990
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.351Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36990", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36990", "datePublished": "2021-10-28T12:26:30", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.351Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39969
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized file access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39969", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized file access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39969", "datePublished": "2022-01-03T21:07:42", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40060
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40060", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40060", "datePublished": "2022-03-07T13:49:47", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.872Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39006
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.106Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39006", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MPTCP module has the race condition vulnerability. Successful exploitation of this vulnerability may cause the device to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39006", "datePublished": "2022-09-16T17:55:56", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.106Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22446
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.225Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T17:39:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22446", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22446", "datePublished": "2021-08-02T17:39:43", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.225Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46742
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized insertion vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46742", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The multi-window module has a vulnerability of unauthorized insertion and tampering of Settings.Secure data.Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized insertion vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46742", "datePublished": "2022-04-11T19:38:22", "dateReserved": "2022-03-26T00:00:00", "dateUpdated": "2024-08-04T05:17:42.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31751
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.118Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Multi-thread contention vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:54:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31751", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel emcom module has multi-thread contention. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Multi-thread contention vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31751", "datePublished": "2022-06-13T14:55:41", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.118Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22426
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.292Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22426", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22426", "datePublished": "2022-02-25T18:11:10", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.292Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31762
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation." } ], "problemTypes": [ { "descriptions": [ { "description": "Input validation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:54:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31762", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AMS module has a vulnerability in input validation. Successful exploitation of this vulnerability may cause privilege escalation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input validation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31762", "datePublished": "2022-06-13T14:56:38", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22403
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of hijacking unverified providers in Huawei Smartphone.Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficient\u807dVerification\u807dof\u807dData\u807dAuthenticity", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22403", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of hijacking unverified providers in Huawei Smartphone.Successful exploitation of this vulnerability may allow attackers to hijack the device and forge UIs to induce users to execute malicious commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficient\u807dVerification\u807dof\u807dData\u807dAuthenticity" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22403", "datePublished": "2021-10-28T12:21:47", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22434
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.403Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22434", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds vulnerability in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22434", "datePublished": "2022-02-25T18:11:07", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40037
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.490Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Vulnerability of accessing resources using an incompatible type (type confusion)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Vulnerability of accessing resources using an incompatible type (type confusion) in the MPTCP subsystem in smartphones. Successful exploitation of this vulnerability may cause the system to crash and restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Vulnerability of accessing resources using an incompatible type (type confusion)" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40037", "datePublished": "2022-01-07T22:39:37", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.490Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31760
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.204Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:03:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31760", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Dialog boxes can still be displayed even if the screen is locked in carrier-customized USSD services. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31760", "datePublished": "2022-06-13T15:03:55", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.204Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22388
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.377Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:43:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22388", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22388", "datePublished": "2021-08-02T16:43:28", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.377Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22390
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Buffer Improper Operation Limit Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:44:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22390", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Buffer Improper Operation Limit Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22390", "datePublished": "2021-08-02T16:44:40", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.294Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37003
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission assignment vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AOD module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may cause permission escalation and unauthorized access to files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission assignment vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37003", "datePublished": "2022-08-09T20:10:59", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46811
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission management vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:06:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "HwSEServiceAPP has a vulnerability in permission management. Successful exploitation of this vulnerability may cause disclosure of the Card Production Life Cycle (CPLC) information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission management vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46811", "datePublished": "2022-06-13T15:06:25", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.663Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40038
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.198Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Double free", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40038", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Double free vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Double free" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40038", "datePublished": "2022-01-07T22:39:38", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37002
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.353Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SystemUI module has a privilege escalation vulnerability. Successful exploitation of this vulnerability can cause malicious applications to pop up windows or run in the background." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37002", "datePublished": "2022-08-09T20:10:52", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37007
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.503Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The chinadrm module has an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37007", "datePublished": "2022-08-09T20:10:24", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22257
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.177Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:18", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22257", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The customization framework has a vulnerability of improper permission control.Successful exploitation of this vulnerability may affect data integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22257", "datePublished": "2022-04-11T19:38:18", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.177Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36997
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.563Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Low memory error in Huawei Smartphone due to the unlimited size of images to be parsed.Successful exploitation of this vulnerability may cause the Gallery or Files app to exit unexpectedly." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based\u807dBuffer\u807dOverflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Low memory error in Huawei Smartphone due to the unlimited size of images to be parsed.Successful exploitation of this vulnerability may cause the Gallery or Files app to exit unexpectedly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based\u807dBuffer\u807dOverflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36997", "datePublished": "2021-10-28T12:27:19", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22483
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.055Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a issue of IP address spoofing in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "IP address spoofing", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:24:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22483", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a issue of IP address spoofing in Huawei Smartphone. Successful exploitation of this vulnerability may cause DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "IP address spoofing" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22483", "datePublished": "2021-10-28T12:24:52", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22402
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.285Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22402", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncaught Exception" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22402", "datePublished": "2021-10-28T12:21:40", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.285Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22485
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.614Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "SSID vulnerability with Wi-Fi network connections", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:24:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22485", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a SSID vulnerability with Wi-Fi network connections in Huawei devices.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "SSID vulnerability with Wi-Fi network connections" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22485", "datePublished": "2021-10-28T12:24:58", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.614Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40012
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.290Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect pointer usage vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:12:13", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40012", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability of pointers being incorrectly used during data transmission in the video framework. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect pointer usage vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40012", "datePublished": "2022-07-11T13:53:47", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.290Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22415
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.966Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Incorrect Calculation of Buffer Size Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause kernel exceptions with the code." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Calculation of Buffer Size", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:48:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22415", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Incorrect Calculation of Buffer Size Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause kernel exceptions with the code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Calculation of Buffer Size" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22415", "datePublished": "2021-08-02T16:48:38", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.966Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36991
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.150Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Huawei Smartphone due to unstandardized path input.Successful exploitation of this vulnerability by creating malicious file paths can cause unauthorized file access." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Huawei Smartphone due to unstandardized path input.Successful exploitation of this vulnerability by creating malicious file paths can cause unauthorized file access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36991", "datePublished": "2021-10-28T12:26:37", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.150Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34737
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission assignment vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34737", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The application security module has a vulnerability in permission assignment. Successful exploitation of this vulnerability may affect data integrity and confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission assignment vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34737", "datePublished": "2022-07-11T13:53:35", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37041
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.690Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37041", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37041", "datePublished": "2021-12-07T15:45:10", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40048
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.159Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect buffer size calculation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:51:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40048", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an incorrect buffer size calculation vulnerability in the video framework. Successful exploitation of this vulnerability will affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect buffer size calculation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40048", "datePublished": "2022-03-07T13:51:00", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40020
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.478Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds array read vulnerability in the security storage module in smartphones. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds array read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40020", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds array read vulnerability in the security storage module in smartphones. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds array read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40020", "datePublished": "2022-01-07T22:39:32", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.478Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31753
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.119Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:06:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31753", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31753", "datePublished": "2022-06-13T15:06:07", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.119Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40061
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Type confusion vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40061", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of accessing resources using an incompatible type (type confusion) in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Type confusion vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40061", "datePublished": "2022-03-07T13:49:40", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.652Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37032
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.564Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Digital Balance to fail to work." } ], "problemTypes": [ { "descriptions": [ { "description": "Bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:15:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37032", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Digital Balance to fail to work." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37032", "datePublished": "2021-11-23T15:15:29", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.564Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37050
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.742Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing sensitive data encryption vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:20", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37050", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Missing sensitive data encryption vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing sensitive data encryption vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37050", "datePublished": "2021-12-08T14:12:20", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.742Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22392
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.355Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause verification bypass and directions to abnormal addresses." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Calculation of Buffer Size", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:45:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22392", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause verification bypass and directions to abnormal addresses." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Calculation of Buffer Size" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22392", "datePublished": "2021-08-02T16:45:43", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.355Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22391
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Calculation of Buffer Size", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:45:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22391", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Incorrect Calculation of Buffer Size in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Calculation of Buffer Size" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22391", "datePublished": "2021-08-02T16:45:01", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40015
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": " EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40015", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": " EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40015", "datePublished": "2022-02-09T22:03:57", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.449Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37035
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.666Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:16:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37035", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37035", "datePublished": "2021-11-23T15:16:40", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.666Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22401
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.860Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Uncaught Exception", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22401", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uncaught Exception" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22401", "datePublished": "2021-10-28T12:21:33", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.860Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37054
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Identity spoofing and authentication bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37054", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Identity spoofing and authentication bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Identity spoofing and authentication bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37054", "datePublished": "2021-12-08T14:12:42", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22437
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.662Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access." } ], "problemTypes": [ { "descriptions": [ { "description": "TOCTOU condition vulnerability caused by software integer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22437", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a software integer overflow leading to a TOCTOU condition in smartphones. Successful exploitation of this vulnerability may cause random address access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "TOCTOU condition vulnerability caused by software integer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22437", "datePublished": "2022-02-25T18:11:01", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.662Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40044
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.466Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": " EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a permission verification vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may cause unauthorized operations." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Handling of Insufficient Permissions or Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": " EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a permission verification vulnerability in the Bluetooth module.Successful exploitation of this vulnerability may cause unauthorized operations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Handling of Insufficient Permissions or Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40044", "datePublished": "2022-02-09T22:03:56", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.466Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-36600
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:30:08.525Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:58:09", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-36600", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability in the power consumption module. Successful exploitation of this vulnerability may cause the system to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-36600", "datePublished": "2022-09-16T17:58:09", "dateReserved": "2022-08-24T00:00:00", "dateUpdated": "2024-08-04T17:30:08.525Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31758
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.103Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Race condition vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:55:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31758", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel module has the race condition vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Race condition vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31758", "datePublished": "2022-06-13T14:55:25", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.103Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37033
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Injection attack vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Injection attack vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:16:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37033", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Injection attack vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Injection attack vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37033", "datePublished": "2021-11-23T15:16:00", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22432
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuring permission isolation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:11", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22432", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuring permission isolation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22432", "datePublished": "2022-02-25T18:11:11", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.386Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34739
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.048Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings." } ], "problemTypes": [ { "descriptions": [ { "description": "Addition overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34739", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fingerprint module has a vulnerability of overflow in arithmetic addition. Successful exploitation of this vulnerability may result in the acquisition of data from unknown addresses in address mappings." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Addition overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34739", "datePublished": "2022-07-11T13:53:23", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.048Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40030
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:11:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40030", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The My HUAWEI app has a defect in the design. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40030", "datePublished": "2022-08-09T20:11:10", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46814
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.632Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds memory read/write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:54:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46814", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The video framework has an out-of-bounds memory read/write vulnerability. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds memory read/write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46814", "datePublished": "2022-06-13T14:54:56", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.632Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22379
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Integer Underflow (Wrap or Wraparound) Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS of Samgr." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:39:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22379", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Integer Underflow (Wrap or Wraparound) Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause DoS of Samgr." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Underflow (Wrap or Wraparound)" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22379", "datePublished": "2021-08-02T16:39:57", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39967
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper broadcast permission settings", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39967", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Vulnerability of obtaining broadcast information improperly due to improper broadcast permission settings in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper broadcast permission settings" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39967", "datePublished": "2022-01-03T21:07:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.223Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37117
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.854Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37117", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37117", "datePublished": "2022-01-03T21:07:29", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.854Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37002
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory out-of-bounds access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37002", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory out-of-bounds access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37002", "datePublished": "2021-10-28T12:27:47", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.593Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39966
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.146Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Uninitialized AOD driver structure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Uninitialized AOD driver structure in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Uninitialized AOD driver structure" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39966", "datePublished": "2022-01-03T21:07:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.146Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40065
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic error vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40065", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The communication module has a service logic error vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic error vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40065", "datePublished": "2022-04-11T19:38:24", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22472
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Insufficiently\u807dProtected\u807dCredentials", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:22:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22472", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Insufficiently\u807dProtected\u807dCredentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22472", "datePublished": "2021-10-28T12:22:37", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22254
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.190Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22254", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A permission bypass vulnerability exists when the NFC CAs access the TEE.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22254", "datePublished": "2022-04-11T19:38:21", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39003
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability will affect the confidentiality and integrity of trusted components." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:58:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39003", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability will affect the confidentiality and integrity of trusted components." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39003", "datePublished": "2022-09-16T17:58:06", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37092
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.701Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Incomplete Cleanup vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37092", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Incomplete Cleanup vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to availability affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incomplete Cleanup vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37092", "datePublished": "2021-12-08T14:13:05", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22436
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": " EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Logic Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic Bypass Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22436", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": " EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Logic Bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Logic Bypass Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22436", "datePublished": "2021-10-28T12:21:15", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37029
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Identity verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Identity verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:14:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37029", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Identity verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Identity verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37029", "datePublished": "2021-11-23T15:14:17", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.674Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22473
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.620Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Authentication (including session management) vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:22:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22473", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Authentication vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Authentication (including session management) vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22473", "datePublished": "2021-10-28T12:22:43", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.620Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22442
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.924Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Validation of Integrity Check Value Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Validation of Integrity Check Value", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:56:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22442", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Validation of Integrity Check Value Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Validation of Integrity Check Value" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22442", "datePublished": "2021-08-02T16:56:16", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.924Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22445
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.315Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T17:39:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22445", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22445", "datePublished": "2021-08-02T17:39:34", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.315Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40064
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.704Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40064", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap-based buffer overflow vulnerability in system components. Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40064", "datePublished": "2022-03-07T13:49:22", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.704Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37008
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.469Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Verification bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The recovery module has a vulnerability of bypassing the verification of an update package before use. Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Verification bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37008", "datePublished": "2022-08-09T20:10:47", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.469Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31759
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.195Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Accessing uninitialized pointers vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:56:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31759", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AppLink has a vulnerability of accessing uninitialized pointers. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Accessing uninitialized pointers vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31759", "datePublished": "2022-06-13T14:56:25", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.195Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36994
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.485Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a issue that trustlist strings being repeatedly inserted into the linked list in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause exceptions when managing the system trustlist." } ], "problemTypes": [ { "descriptions": [ { "description": "Competitive Condition Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36994", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a issue that trustlist strings being repeatedly inserted into the linked list in Huawei Smartphone due to race conditions. Successful exploitation of this vulnerability can cause exceptions when managing the system trustlist." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Competitive Condition Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36994", "datePublished": "2021-10-28T12:26:58", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.485Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Argument injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:11:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Settings application has an argument injection vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Argument injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37005", "datePublished": "2022-08-09T20:11:06", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.603Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37049
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.723Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based buffer overflow vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may rewrite the memory of adjacent objects." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37049", "datePublished": "2021-12-08T14:12:15", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.723Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22475
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper permission management vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Control Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:24:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22475", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper permission management vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission Control Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22475", "datePublished": "2021-10-28T12:24:38", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.998Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22389
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permission Control Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission Control Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:43:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22389", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permission Control Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause certain codes to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission Control Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22389", "datePublished": "2021-08-02T16:43:54", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.294Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37133
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:16:03.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "9.1.0" }, { "status": "affected", "version": "9.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.1.1" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized file access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:40", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37133", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "9.1.0" }, { "version_affected": "=", "version_value": "9.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.1.1" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized file access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37133", "datePublished": "2022-01-03T21:07:40", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:16:03.180Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22429
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.799Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22429", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22429", "datePublished": "2022-02-25T18:11:12", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.799Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37001
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.756Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Register tampering vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow the register value to be modified." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:42", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37001", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Register tampering vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow the register value to be modified." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37001", "datePublished": "2021-10-28T12:27:42", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.756Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22438
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.310Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory Buffer Improper Operation Limit Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:55:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22438", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory Buffer Improper Operation Limit Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory Buffer Improper Operation Limit Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22438", "datePublished": "2021-08-02T16:55:27", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.310Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37042
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.783Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37042", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37042", "datePublished": "2021-12-07T15:45:16", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22256
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.317Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper access control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22256", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DFX module has an access control vulnerability.Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper access control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22256", "datePublished": "2022-04-11T19:38:19", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.317Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37040
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.651Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting." } ], "problemTypes": [ { "descriptions": [ { "description": "Parameter injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:11:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37040", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Parameter injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause privilege escalation of files after CIFS share mounting." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Parameter injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37040", "datePublished": "2021-12-08T14:11:56", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37051
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.672Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:25", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause out-of-bounds memory access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37051", "datePublished": "2021-12-08T14:12:25", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.672Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22413
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.661Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" }, { "status": "affected", "version": "8.2" }, { "status": "affected", "version": "8.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:46:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22413", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" }, { "version_affected": "=", "version_value": "8.2" }, { "version_affected": "=", "version_value": "8.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the system to reset." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22413", "datePublished": "2021-08-02T16:46:57", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22412
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.011Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random kernel address access." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer Overflow Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:46:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22412", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Integer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random kernel address access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer Overflow Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22412", "datePublished": "2021-08-02T16:46:10", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22443
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random address access." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:58:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22443", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause random address access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22443", "datePublished": "2021-08-02T16:58:41", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.980Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34742
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.283Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Read/Write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:11:50", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34742", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The system module has a read/write vulnerability. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Read/Write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34742", "datePublished": "2022-07-11T13:53:29", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.283Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22319
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:37:18.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22319", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause integer overflows." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202109-0000001150310956" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22319", "datePublished": "2022-02-25T18:11:05", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:37:18.495Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37046
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.728Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory leak vulnerability with the codec detection module in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart due to memory exhaustion." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leak vulnerability with the codec detection module", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37046", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory leak vulnerability with the codec detection module in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart due to memory exhaustion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leak vulnerability with the codec detection module" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37046", "datePublished": "2021-12-07T15:45:21", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46788
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.325Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Third-party pop-up window coverage vulnerability in the iConnect module.Successful exploitation of this vulnerability may cause system pop-up window may be covered to mislead users to perform incorrect operations." } ], "problemTypes": [ { "descriptions": [ { "description": "Third-party pop-up window coverage vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:02:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46788", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Third-party pop-up window coverage vulnerability in the iConnect module.Successful exploitation of this vulnerability may cause system pop-up window may be covered to mislead users to perform incorrect operations." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Third-party pop-up window coverage vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46788", "datePublished": "2022-05-13T15:02:51", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36989
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.380Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Kernel crash vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "Kernel crash vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36989", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Kernel crash vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Kernel crash vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36989", "datePublished": "2021-10-28T12:26:23", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.380Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38979
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.710Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38979", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38979", "datePublished": "2022-09-16T17:56:43", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.710Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37111
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.760Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leakage", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:27", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37111", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory leakage vulnerability in Smartphone.Successful exploitation of this vulnerability may cause memory exhaustion." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leakage" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37111", "datePublished": "2022-01-03T21:07:27", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37053
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37053", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Service logic vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37053", "datePublished": "2021-12-08T14:12:34", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22431
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.307Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuring permission isolation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:09", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22431", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability when configuring permission isolation in smartphones. Successful exploitation of this vulnerability may cause out-of-bounds access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuring permission isolation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22431", "datePublished": "2022-02-25T18:11:09", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.307Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40047
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Release of Resource after Effective Lifetime", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:51:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40047", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of memory not being released after effective lifetime in the Bastet module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Release of Resource after Effective Lifetime" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40047", "datePublished": "2022-03-07T13:51:07", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40031
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.597Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:35", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40031", "datePublished": "2022-01-07T22:39:35", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34743
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.298Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:04", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34743", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AT commands of the USB port have an out-of-bounds read vulnerability. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34743", "datePublished": "2022-07-11T13:53:04", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.298Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22384
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.275Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:41:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22384", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Information Disclosure Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22384", "datePublished": "2021-08-02T16:41:53", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.275Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34741
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34741", "datePublished": "2022-07-11T13:53:17", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36988
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36988", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Parameter verification issue in Huawei Smartphone.Successful exploitation of this vulnerability can affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36988", "datePublished": "2021-10-28T12:26:15", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22387
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.232Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper Control of Dynamically Managing Code Resources Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to remotely execute commands." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper Control of Dynamically Managing Code Resources", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:42:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22387", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper Control of Dynamically Managing Code Resources Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to remotely execute commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Control of Dynamically Managing Code Resources" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22387", "datePublished": "2021-08-02T16:42:51", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40009
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.289Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:33", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40009", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds write vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40009", "datePublished": "2022-01-07T22:39:33", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.289Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40026
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.227Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40026", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based buffer overflow vulnerability in the AOD module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40026", "datePublished": "2022-01-07T22:39:34", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.227Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37103
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper permission management vulnerability in the Wallet apps. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission management vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:13", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37103", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper permission management vulnerability in the Wallet apps. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission management vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37103", "datePublished": "2022-02-25T18:11:13", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37052
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.743Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage." } ], "problemTypes": [ { "descriptions": [ { "description": "Exception log vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Exception log vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause address information leakage." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Exception log vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37052", "datePublished": "2021-12-08T14:12:30", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.743Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36996
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.341Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of certain virtual information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper verification", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:27:13", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36996", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause transmission of certain virtual information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper verification" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36996", "datePublished": "2021-10-28T12:27:13", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.341Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40054
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.517Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an integer underflow vulnerability in the atcmdserver module. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Integer underflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:21", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40054", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an integer underflow vulnerability in the atcmdserver module. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Integer underflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40054", "datePublished": "2022-03-07T13:50:21", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40052
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect buffer size calculation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:12:24", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40052", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an incorrect buffer size calculation vulnerability in the video framework.Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect buffer size calculation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40052", "datePublished": "2022-03-07T13:50:35", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.165Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39000
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.427Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup." } ], "problemTypes": [ { "descriptions": [ { "description": "Malicious app control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:55:46", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39000", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The iAware module has a vulnerability in managing malicious apps.Successful exploitation of this vulnerability will cause malicious apps to automatically start upon system startup." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Malicious app control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39000", "datePublished": "2022-09-16T17:55:46", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37045
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "UAF vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an UAF vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart unexpectedly and the kernel-mode code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "UAF vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37045", "datePublished": "2021-12-08T14:12:07", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37075
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.793Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected." } ], "problemTypes": [ { "descriptions": [ { "description": "Credentials Management Errors vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:00", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37075", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Credentials Management Errors vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to confidentiality affected." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Credentials Management Errors vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37075", "datePublished": "2021-12-08T14:13:00", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.793Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37027
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:04", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37027", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a DoS vulnerability in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37027", "datePublished": "2022-02-25T18:11:04", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37037
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.640Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Invalid address access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:11:47", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37037", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Invalid address access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause the device to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Invalid address access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37037", "datePublished": "2021-12-08T14:11:47", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46787
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/5/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-13T15:02:34", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46787", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The AMS module has a vulnerability of improper permission control.Successful exploitation of this vulnerability may cause non-system application processes to crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/5/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/5/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202205-0000001245813162" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46787", "datePublished": "2022-05-13T15:02:34", "dateReserved": "2022-04-25T00:00:00", "dateUpdated": "2024-08-04T05:17:42.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22488
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.607Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22488", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unauthorized file access vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability by modifying soft links may tamper with the files restored from backups." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22488", "datePublished": "2021-10-28T12:25:17", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.607Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22405
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.220Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:22:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22405", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22405", "datePublished": "2021-10-28T12:22:03", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.220Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40016
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.606Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:57", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40016", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40016", "datePublished": "2022-07-11T13:53:57", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.606Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36993
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.365Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Memory leaks vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leaks", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36993", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Memory leaks vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leaks" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36993", "datePublished": "2021-10-28T12:26:51", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.365Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37039
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.540Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Input verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:11:51", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37039", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause Bluetooth DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37039", "datePublished": "2021-12-08T14:11:51", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.540Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40058
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.574Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:59", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40058", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a heap-based buffer overflow vulnerability in the video framework. Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40058", "datePublished": "2022-03-07T13:49:59", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.574Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38978
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:31.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38978", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38978", "datePublished": "2022-09-16T17:56:37", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:31.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22474
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.839Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds memory access in Huawei Smartphone.Successful exploitation of this vulnerability may cause process exceptions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:24:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22474", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds memory access in Huawei Smartphone.Successful exploitation of this vulnerability may cause process exceptions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22474", "datePublished": "2021-10-28T12:24:32", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.839Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22404
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Directory traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Directory traversal vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:21:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22404", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Directory traversal vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Directory traversal vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22404", "datePublished": "2021-10-28T12:21:54", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-36601
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:30:08.424Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Out-of-bounds write vulnerability in the kernel modules. Successful exploitation of this vulnerability may cause a panic reboot." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds write vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:58:12", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2020-36601", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability in the kernel modules. Successful exploitation of this vulnerability may cause a panic reboot." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2020-36601", "datePublished": "2022-09-16T17:58:12", "dateReserved": "2022-08-24T00:00:00", "dateUpdated": "2024-08-04T17:30:08.424Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37031
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote DoS vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:15:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37031", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Remote DoS vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability will cause the app to exit unexpectedly." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote DoS vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37031", "datePublished": "2021-11-23T15:15:05", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40034
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory overwriting vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:14", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The video framework has the memory overwriting vulnerability caused by addition overflow. Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory overwriting vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40034", "datePublished": "2022-08-09T20:10:14", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.218Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40013
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:30.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:52", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40013", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper permission control vulnerability in the Bluetooth module.Successful exploitation of this vulnerability will affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40013", "datePublished": "2022-07-11T13:53:52", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:30.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40062
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Copy without Checking Size of Input", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:31", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40062", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Copy without Checking Size of Input" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40062", "datePublished": "2022-03-07T13:49:31", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.491Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37056
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.866Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:37", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37056", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37056", "datePublished": "2021-12-07T15:45:37", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.866Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37055
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.746Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Logic bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:32", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37055", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Logic bypass vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may allow attempts to obtain certain device information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Logic bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37055", "datePublished": "2021-12-07T15:45:32", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.746Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31755
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.098Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission preservation vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:54:19", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31755", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The communication module has a vulnerability of improper permission preservation. Successful exploitation of this vulnerability may affect system availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission preservation vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31755", "datePublished": "2022-06-13T14:56:09", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.098Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22433
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.664Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory address out of bounds", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22433", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a memory address out of bounds in smartphones. Successful exploitation of this vulnerability may cause malicious code to be executed." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory address out of bounds" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22433", "datePublished": "2022-02-25T18:11:08", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.664Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31756
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.205Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Design defects vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T14:55:54", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31756", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The fingerprint sensor module has design defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Design defects vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31756", "datePublished": "2022-06-13T14:55:54", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37044
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.792Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:12:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37044", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permission control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37044", "datePublished": "2021-12-08T14:12:01", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.792Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-38997
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defects", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:57:08", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-38997", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The secure OS module has configuration defects. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defects" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-38997", "datePublished": "2022-09-16T17:57:08", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.402Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40055
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.758Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Man-in-the-middle attack vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:15", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40055", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a man-in-the-middle attack vulnerability during system update download in recovery mode. Successful exploitation of this vulnerability may affect integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Man-in-the-middle attack vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40055", "datePublished": "2022-03-07T13:50:15", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40039
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/1/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.426Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-07T22:39:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40039", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/1/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/1/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202201-0000001238736331" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40039", "datePublished": "2022-01-07T22:39:39", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.426Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34740
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.234Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34740", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The NFC module has a buffer overflow vulnerability. Successful exploitation of this vulnerability may cause exceptions in NFC card registration, deletion, and activation." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34740", "datePublished": "2022-07-11T13:53:10", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.234Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36986
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.316Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds Write", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36986", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of tampering with the kernel in Huawei Smartphone.Successful exploitation of this vulnerability may escalate permissions." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36986", "datePublished": "2021-10-28T12:25:45", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.316Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22435
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.945Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Configuration Defect Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration Defect", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:54:58", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Configuration Defect Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service integrity and availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration Defect" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22435", "datePublished": "2021-08-02T16:54:58", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37113
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.715Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Privilege escalation", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:28", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37113", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Privilege escalation vulnerability with the file system component in Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Privilege escalation" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37113", "datePublished": "2022-01-03T21:07:28", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40051
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unauthorized access vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40051", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an unauthorized access vulnerability in system components. Successful exploitation of this vulnerability will affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unauthorized access vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40051", "datePublished": "2022-03-07T13:50:41", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36985
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.647Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Code injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may exhaust system resources and cause the system to restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Code injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:38", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36985", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Code injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may exhaust system resources and cause the system to restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36985", "datePublished": "2021-10-28T12:25:38", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.647Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40059
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:53", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40059", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a permission control vulnerability in the Wi-Fi module. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40059", "datePublished": "2022-03-07T13:49:53", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-46813
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.754Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Weaknesses Introduced During Design", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:06:56", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-46813", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Weaknesses Introduced During Design" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-46813", "datePublished": "2022-06-13T15:06:56", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-04T05:17:42.754Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22427
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Heap-based Buffer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass." } ], "problemTypes": [ { "descriptions": [ { "description": "Heap-based Buffer Overflow", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T16:49:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22427", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Heap-based Buffer Overflow Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to authentication bypass." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22427", "datePublished": "2021-08-02T16:49:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36992
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.608Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Public key verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Incorrect Implementation of Authentication Algorithm", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:26:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-36992", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Public key verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Incorrect Implementation of Authentication Algorithm" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-36992", "datePublished": "2021-10-28T12:26:45", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.608Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22486
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.032Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a issue of Unstandardized field names in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstandardized field names", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:05", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22486", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a issue of Unstandardized field names in Huawei Smartphone. Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstandardized field names" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22486", "datePublished": "2021-10-28T12:25:05", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.032Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37030
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.536Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper permission vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:14:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37030", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper permission vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37030", "datePublished": "2021-11-23T15:14:41", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.536Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39005
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.354Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leak vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:07", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39005", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leak vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39005", "datePublished": "2022-09-16T17:56:07", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.354Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-37004
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/8/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T10:21:32.259Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-box experience bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:10:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-37004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Settings application has a vulnerability of bypassing the out-of-box experience (OOBE). Successful exploitation of this vulnerability may affect the availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-box experience bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/8/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202208-0000001363876177" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-37004", "datePublished": "2022-08-09T20:10:55", "dateReserved": "2022-07-28T00:00:00", "dateUpdated": "2024-08-03T10:21:32.259Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37034
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/8/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.359Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Unstandardized field names in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Unstandardized field names", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-23T15:16:17", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37034", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Unstandardized field names in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Unstandardized field names" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/8/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/8/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37034", "datePublished": "2021-11-23T15:16:17", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39973
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.108Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down." } ], "problemTypes": [ { "descriptions": [ { "description": "Null pointer dereference", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:43", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39973", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Null pointer dereference in Smartphones.Successful exploitation of this vulnerability may cause the kernel to break down." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Null pointer dereference" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39973", "datePublished": "2022-01-03T21:07:43", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.108Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22490
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Permission verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect the device performance." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper authorization", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:23", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22490", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Permission verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect the device performance." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper authorization" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22490", "datePublished": "2021-10-28T12:25:23", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.067Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-22253
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/4/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:07:50.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper validation of integrity check values Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-11T19:38:22", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-22253", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The DFX module has a vulnerability of improper validation of integrity check values.Successful exploitation of this vulnerability may affect system stability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper validation of integrity check values Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/4/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/4/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202204-0000001224076294" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-22253", "datePublished": "2022-04-11T19:38:22", "dateReserved": "2021-12-22T00:00:00", "dateUpdated": "2024-08-03T03:07:50.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31752
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.101Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing authorization vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:07:45", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31752", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Missing authorization vulnerability in the system components. Successful exploitation of this vulnerability will affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing authorization vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31752", "datePublished": "2022-06-13T15:07:45", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.101Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39004
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2022/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.491Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ], "problemTypes": [ { "descriptions": [ { "description": "Memory leak vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-16T17:56:03", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-39004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" }, { "version_affected": "=", "version_value": "2.1" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The MPTCP module has the memory leak vulnerability. Successful exploitation of this vulnerability can cause memory leaks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Memory leak vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202209-0000001392278845" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2022/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-39004", "datePublished": "2022-09-16T17:56:03", "dateReserved": "2022-08-29T00:00:00", "dateUpdated": "2024-08-03T11:10:32.491Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22448
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper verification vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:02", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22448", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper verification vulnerability in smartphones. Successful exploitation of this vulnerability may cause unauthorized read and write of some files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper verification vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22448", "datePublished": "2022-02-25T18:11:02", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22394
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:12.293Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer overflow vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22394", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a buffer overflow vulnerability in smartphones. Successful exploitation of this vulnerability may cause DoS of the apps during Multi-Screen Collaboration." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer overflow vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202108-0000001181125881" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22394", "datePublished": "2022-02-25T18:11:06", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:12.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31757
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.279Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper use of APIs vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:05:48", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31757", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The setting module has a vulnerability of improper use of APIs. Successful exploitation of this vulnerability may affect data confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper use of APIs vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202206-0000001270350482" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31757", "datePublished": "2022-06-13T15:05:48", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.279Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40063
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper access control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:49:26", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40063", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an improper access control vulnerability in the video module. Successful exploitation of this vulnerability may affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper access control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40063", "datePublished": "2022-03-07T13:49:26", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.445Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-34738
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/7/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:09.054Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "12.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-11T13:53:41", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-34738", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "12.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SystemUI module has a vulnerability in permission control. If this vulnerability is successfully exploited, users are unaware of the service running in the background." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/7/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202207-0000001342389149" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-34738", "datePublished": "2022-07-11T13:53:41", "dateReserved": "2022-06-28T00:00:00", "dateUpdated": "2024-08-03T09:22:09.054Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40056
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.862Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Buffer Copy without Checking Size of Input", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40056", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of copying input buffer without checking its size in the video framework. Successful exploitation of this vulnerability may affect availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Buffer Copy without Checking Size of Input" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40056", "datePublished": "2022-03-07T13:50:10", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.862Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22430
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection." } ], "problemTypes": [ { "descriptions": [ { "description": "Logic bypass vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-25T18:11:10", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22430", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a logic bypass vulnerability in smartphones. Successful exploitation of this vulnerability may cause code injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Logic bypass vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-phones-202107-0000001170634565" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22430", "datePublished": "2022-02-25T18:11:10", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31754
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.160Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features." } ], "problemTypes": [ { "descriptions": [ { "description": "Logical defects vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:06:39", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31754", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Logical defects in code implementation in some products. Successful exploitation of this vulnerability may affect the availability of some features." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Logical defects vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31754", "datePublished": "2022-06-13T15:06:39", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.160Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40049
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/3/ | x_refsource_MISC | |
https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.210Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization." } ], "problemTypes": [ { "descriptions": [ { "description": "Permission control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-07T13:50:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40049", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a permission control vulnerability in the PMS module. Successful exploitation of this vulnerability can lead to sensitive system information being obtained without authorization." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Permission control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/3/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/3/" }, { "name": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193", "refsource": "MISC", "url": "https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202203-0000001257385193" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40049", "datePublished": "2022-03-07T13:50:55", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.210Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22444
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:13.245Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause code injection." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-02T17:00:01", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22444", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input Verification Vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may cause code injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22444", "datePublished": "2021-08-02T17:00:01", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:13.245Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37038
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/9/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.635Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Improper access control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Improper access control vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-07T15:45:06", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37038", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Improper access control vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper access control vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/9/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/9/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37038", "datePublished": "2021-12-07T15:45:07", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.635Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-22491
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/7/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:44:14.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ], "problemTypes": [ { "descriptions": [ { "description": "Input Verification Vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-28T12:25:31", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-22491", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Input verification vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Input Verification Vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/7/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/7/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-22491", "datePublished": "2021-10-28T12:25:31", "dateReserved": "2021-01-05T00:00:00", "dateUpdated": "2024-08-03T18:44:14.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-31761
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/6/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:26:01.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Configuration defectsl vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T15:07:29", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2022-31761", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Configuration defects in the secure OS module. Successful exploitation of this vulnerability will affect confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Configuration defectsl vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/6/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/6/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2022-31761", "datePublished": "2022-06-13T15:07:29", "dateReserved": "2022-05-27T00:00:00", "dateUpdated": "2024-08-03T07:26:01.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37097
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727 | x_refsource_MISC | |
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.751Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.1" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" }, { "status": "affected", "version": "2.1.1" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart." } ], "problemTypes": [ { "descriptions": [ { "description": "Code Injection vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-08T14:13:16", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37097", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.1" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" }, { "version_affected": "=", "version_value": "2.1.1" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Code Injection vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to system restart." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code Injection vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202109-0000001196270727" }, { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37097", "datePublished": "2021-12-08T14:13:16", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.751Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-40045
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2022/2/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:27:31.481Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "12.0.0" }, { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Support for Integrity Check", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:03:55", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-40045", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "12.0.0" }, { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a vulnerability of signature verification mechanism failure in system upgrade through recovery mode.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Support for Integrity Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2022/2/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2022/2/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202202-0000001204253396" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-40045", "datePublished": "2022-02-09T22:03:55", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:27:31.481Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37119
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/10/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:09:07.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "11.0.1" }, { "status": "affected", "version": "11.0.0" }, { "status": "affected", "version": "10.1.1" }, { "status": "affected", "version": "10.1.0" }, { "status": "affected", "version": "10.0.0" }, { "status": "affected", "version": "9.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "4.0.0" }, { "status": "affected", "version": "3.1.1" }, { "status": "affected", "version": "3.1.0" }, { "status": "affected", "version": "3.0.0" } ] }, { "product": "Harmony OS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ], "problemTypes": [ { "descriptions": [ { "description": "Service logic", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:30", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-37119", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "11.0.1" }, { "version_affected": "=", "version_value": "11.0.0" }, { "version_affected": "=", "version_value": "10.1.1" }, { "version_affected": "=", "version_value": "10.1.0" }, { "version_affected": "=", "version_value": "10.0.0" }, { "version_affected": "=", "version_value": "9.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0" }, { "version_affected": "=", "version_value": "3.1.1" }, { "version_affected": "=", "version_value": "3.1.0" }, { "version_affected": "=", "version_value": "3.0.0" } ] } }, { "product_name": "Harmony OS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a Service logic vulnerability in Smartphone.Successful exploitation of this vulnerability may cause WLAN DoS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Service logic" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/10/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/10/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202110-0000001162998526" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-37119", "datePublished": "2022-01-03T21:07:30", "dateReserved": "2021-07-20T00:00:00", "dateUpdated": "2024-08-04T01:09:07.810Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-39974
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://consumer.huawei.com/en/support/bulletin/2021/11/ | x_refsource_MISC | |
https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:20:34.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EMUI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "10.1.0" } ] }, { "product": "Magic UI", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "3.1.0" } ] }, { "product": "HarmonyOS", "vendor": "Huawei", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "descriptions": [ { "lang": "en", "value": "There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-03T21:07:44", "orgId": "25ac1063-e409-4190-8079-24548c77ea2e", "shortName": "huawei" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@huawei.com", "ID": "CVE-2021-39974", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EMUI", "version": { "version_data": [ { "version_affected": "=", "version_value": "10.1.0" } ] } }, { "product_name": "Magic UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.1.0" } ] } }, { "product_name": "HarmonyOS", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "Huawei" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is an Out-of-bounds read in Smartphones.Successful exploitation of this vulnerability may affect service confidentiality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read" } ] } ] }, "references": { "reference_data": [ { "name": "https://consumer.huawei.com/en/support/bulletin/2021/11/", "refsource": "MISC", "url": "https://consumer.huawei.com/en/support/bulletin/2021/11/" }, { "name": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667", "refsource": "MISC", "url": "https://device.harmonyos.com/en/docs/security/update/security-bulletins-202111-0000001217889667" } ] } } } }, "cveMetadata": { "assignerOrgId": "25ac1063-e409-4190-8079-24548c77ea2e", "assignerShortName": "huawei", "cveId": "CVE-2021-39974", "datePublished": "2022-01-03T21:07:44", "dateReserved": "2021-08-23T00:00:00", "dateUpdated": "2024-08-04T02:20:34.242Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }